Static task
static1
Behavioral task
behavioral1
Sample
4746b0e7c23545d27bb5fe400bcfbec0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4746b0e7c23545d27bb5fe400bcfbec0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4746b0e7c23545d27bb5fe400bcfbec0_JaffaCakes118
-
Size
44KB
-
MD5
4746b0e7c23545d27bb5fe400bcfbec0
-
SHA1
51474140a67c99de78944bac54a3b682e02aa0c4
-
SHA256
2514f4849aaeee7fd14e8361dfe5e1cf01dc21ba3d3c4094b6db4bfec15c8714
-
SHA512
ef9a33dcc414bda3a7c7f8c290e1568478310ca55c21c36f43abc8590d2dbe16444dded98fe72ddf74dead7f7787844de528b814da49a5946158cb269d1dbd62
-
SSDEEP
768:3VVcE2KxRgdf0lFxdCH48zpivabS4/DRrS0do8lDEQvFahdHd9aLdvP0om:TcE2o+hY8zpiboRjdo8xEKFid9aLdP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4746b0e7c23545d27bb5fe400bcfbec0_JaffaCakes118
Files
-
4746b0e7c23545d27bb5fe400bcfbec0_JaffaCakes118.exe windows:0 windows x86 arch:x86
e1f802e8915503ebaaa60cd87a3ba4be
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExW
ExpandEnvironmentStringsW
FileTimeToSystemTime
GetStartupInfoA
SetCurrentDirectoryA
AddAtomW
LocalAlloc
GetCurrentThreadId
lstrcmpiW
GetVolumeInformationW
GetProcAddress
FileTimeToDosDateTime
user32
GetCapture
LoadImageA
GetCursorPos
GetParent
GetKeyState
DestroyIcon
GetFocus
GetMenuStringA
GetClassNameW
LoadIconA
IsIconic
wvsprintfA
GetSysColor
LoadIconW
keybd_event
gdi32
GetObjectW
CreateFontIndirectA
advapi32
RegRestoreKeyW
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 919B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 234B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ