Static task
static1
Behavioral task
behavioral1
Sample
4bc10154056887dabc4f79bfa41b4d83_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4bc10154056887dabc4f79bfa41b4d83_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4bc10154056887dabc4f79bfa41b4d83_JaffaCakes118
-
Size
382KB
-
MD5
4bc10154056887dabc4f79bfa41b4d83
-
SHA1
b6ef5cae63101a11637bbcaa95e03c183397fd46
-
SHA256
67a06e82e55cd8aa8c8a780fabf2d48622d720b3b48a419026c8a33fc1096950
-
SHA512
8bc5e91cf116e12fe508892dbbec3b4004149f9d1f150f01240fbbc1036db5542d3f0198a20022abe6799b95c406b0fabda3ebfaa6661f09350ed6c32251aa3e
-
SSDEEP
6144:Lh3s7tl90cu11Tif+0ABIgzQW3QiYMRy4S9JidKq4HYK8w:LmV0d11O+LBvR39YMA42JwKq88w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4bc10154056887dabc4f79bfa41b4d83_JaffaCakes118
Files
-
4bc10154056887dabc4f79bfa41b4d83_JaffaCakes118.exe windows:4 windows x86 arch:x86
3a1bfae4d23f37d725f5100ceb455086
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadConsoleA
OpenFileMappingA
GetFileTime
DeleteFileW
GetFileSize
SetLastError
GetCommandLineA
GetLastError
GlobalFree
WriteFile
FindAtomA
FindFirstFileA
OpenFile
GetComputerNameA
ExitThread
DeleteAtom
GetStdHandle
GetConsoleMode
GetCPInfo
CreateProcessA
DeleteFileA
Sleep
user32
IsMenu
GetCursor
DialogBoxParamA
LoadMenuA
CopyRect
DrawIconEx
EndDialog
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 316KB - Virtual size: 315KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 228B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 849B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 37KB - Virtual size: 481KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ