Static task
static1
Behavioral task
behavioral1
Sample
48b5b17e1bfe7aa3f741c9a03c75e56c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
48b5b17e1bfe7aa3f741c9a03c75e56c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
48b5b17e1bfe7aa3f741c9a03c75e56c_JaffaCakes118
-
Size
814KB
-
MD5
48b5b17e1bfe7aa3f741c9a03c75e56c
-
SHA1
68495d84fc34954d02143cc400a4a9f57e3172bf
-
SHA256
14201a6a3a53b0b41258624b82e37a714531dc9306d60f02e3866dc2e46c9609
-
SHA512
dad2a533d2f38a3c6d62308cc986afaaabbffe1c12607e27130a9201f80547546a4a99366a495875659298e3dc6c752d55593fe1be817dcea8293e4adc85a107
-
SSDEEP
24576:qYuLhSabrnHxh0wmh0rIUzvbjMcMe1Kkfm4:uhVrHUwuUfjHvB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48b5b17e1bfe7aa3f741c9a03c75e56c_JaffaCakes118
Files
-
48b5b17e1bfe7aa3f741c9a03c75e56c_JaffaCakes118.exe windows:4 windows x86 arch:x86
234925f889249a953d9dfdd3206d3550
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
GetModuleHandleA
HeapCreate
IsDebuggerPresent
FreeEnvironmentStringsA
TlsGetValue
GlobalLock
CreateFileA
CreateFileMappingA
GetFullPathNameA
CreateEventA
GetLastError
LoadLibraryExA
LocalUnlock
IsBadReadPtr
CloseHandle
GetStdHandle
GetACP
LocalFree
GetConsoleCP
user32
GetMessageA
EmptyClipboard
GetDlgItem
SetFocus
ScrollWindow
CreateDialogParamA
DispatchMessageA
PostMessageA
DefWindowProcA
GetDC
GetIconInfo
EndDialog
IsWindow
DrawIconEx
uxtheme
GetThemeMetric
GetThemeColor
EnableTheming
CloseThemeData
DrawThemeIcon
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ