Static task
static1
Behavioral task
behavioral1
Sample
4b13b730ffc679860b0d2cf1140cff2a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4b13b730ffc679860b0d2cf1140cff2a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4b13b730ffc679860b0d2cf1140cff2a_JaffaCakes118
-
Size
256KB
-
MD5
4b13b730ffc679860b0d2cf1140cff2a
-
SHA1
9cb505bd7dbdb0ba2f8444ea60721a58cebd9032
-
SHA256
a6eea35d870665c04b56fed311a4d6df3431647f057f93e98f058dd7c29f4d72
-
SHA512
80101ed359c5e1cb72b42f528dce19cd62d626700d83bf0f3dab6f977d42f4aeea2ecddd95f715ec9ce8520016323a9fb7d11143cb52a09cc82912056ea6f13c
-
SSDEEP
6144:4adYEqo+cVPTFBaVlePaWnfJMt5P9xVPBZjrxREsq/y1D8:4BdleP/yzPJZ1rgs34
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b13b730ffc679860b0d2cf1140cff2a_JaffaCakes118
Files
-
4b13b730ffc679860b0d2cf1140cff2a_JaffaCakes118.exe windows:4 windows x86 arch:x86
97d834856a22ea9c4f49de352a3023ad
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateEventA
CreateFileMappingA
CreateThread
DeleteFileA
EnterCriticalSection
ExitThread
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
GlobalAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
RaiseException
ReleaseMutex
SetEvent
Sleep
WaitForSingleObject
WriteConsoleA
lstrcpynA
lstrlenA
user32
BeginPaint
CharNextW
ClientToScreen
FindWindowA
LoadAcceleratorsW
PostThreadMessageW
RemovePropW
SetWindowPos
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 850B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 242KB - Virtual size: 245KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ