Static task
static1
Behavioral task
behavioral1
Sample
440d9e81b37ebad0776508c71ec5a188_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
440d9e81b37ebad0776508c71ec5a188_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
440d9e81b37ebad0776508c71ec5a188_JaffaCakes118
-
Size
392KB
-
MD5
440d9e81b37ebad0776508c71ec5a188
-
SHA1
53c08a85eba7733f091a7fbb653d315e84bd25b0
-
SHA256
f1f98f2bacefbdbc1abb7f62f00036b3e5da948f6e3ac099e2a99a345360beb7
-
SHA512
748d5ba06cdeae86ff48fe7f2270002e0c0587f72196eaffbaccbfcbfb567726b3317c03999d108b6d426830c95499b0110b0c91f6749aa12e1c6b754ad40ba6
-
SSDEEP
12288:GDXUyau9eyDi8Zwb2FJxjTwQN5fg1Eth6XEb:iR9eyWKwkJxruLUb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 440d9e81b37ebad0776508c71ec5a188_JaffaCakes118
Files
-
440d9e81b37ebad0776508c71ec5a188_JaffaCakes118.exe windows:4 windows x86 arch:x86
97660400c2f4b1f03ee81acde996e6c0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeEnvironmentStringsA
GetACP
SetLastError
CreateFileA
CreateMutexA
HeapCreate
ExitProcess
GlobalFree
IsBadCodePtr
FindClose
UnmapViewOfFile
GetLastError
LocalUnlock
FindResourceA
LoadLibraryExA
SetVolumeMountPointA
FreeConsole
TlsGetValue
HeapDestroy
GetModuleHandleA
user32
CopyRect
DrawMenuBar
GetIconInfo
GetFocus
FillRect
CheckRadioButton
DrawEdge
GetDC
DefWindowProcW
CallWindowProcA
GetDlgItem
DispatchMessageA
IsWindow
uxtheme
DrawThemeText
GetThemeSysInt
DrawThemeEdge
DrawThemeIcon
GetThemeRect
clbcatq
SetupOpen
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ