Static task
static1
Behavioral task
behavioral1
Sample
4ac53a40a3108c1a02ea2b80262d940b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4ac53a40a3108c1a02ea2b80262d940b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4ac53a40a3108c1a02ea2b80262d940b_JaffaCakes118
-
Size
78KB
-
MD5
4ac53a40a3108c1a02ea2b80262d940b
-
SHA1
85356b252472225f4de4cf7211454fada40e8881
-
SHA256
2bc39227aff178c8583f9e534abc7ec8267d2dba9d3b4a553da932fa7b6d4e32
-
SHA512
a5189ad3ba46acbf51ffe4db0d834c399ede9017810e8e6d19d8dac03eb4e0da3fd92c4e9b843196623f5f9da1bd17efa76cf85ddbeee405577b0c4131834d37
-
SSDEEP
1536:LSXQnfz+Ys/TjWFlQ+YMaj0YMnwMsyI048yVBBQK:WXQI2FlDYMu04Y6oK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ac53a40a3108c1a02ea2b80262d940b_JaffaCakes118
Files
-
4ac53a40a3108c1a02ea2b80262d940b_JaffaCakes118.exe windows:4 windows x86 arch:x86
e3f52da561361e67f256981d8d5709d3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetFileSize
GetProcAddress
VirtualAlloc
LoadLibraryA
VirtualProtect
LockResource
LoadResource
FindResourceA
HeapFree
GetProcessHeap
VirtualProtectEx
VirtualAllocEx
GetCurrentProcess
ExitProcess
ResetEvent
GetModuleHandleA
GetCurrentThreadId
HeapAlloc
InterlockedExchange
RtlUnwind
VirtualQuery
user32
PostMessageA
DispatchMessageA
TranslateMessage
GetMessageA
UpdateWindow
ShowWindow
CreateWindowExA
RegisterClassExA
DefWindowProcA
SendMessageA
PostQuitMessage
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ