Static task
static1
Behavioral task
behavioral1
Sample
4d37a0c0108842decf8ded9321dfba68_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4d37a0c0108842decf8ded9321dfba68_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4d37a0c0108842decf8ded9321dfba68_JaffaCakes118
-
Size
136KB
-
MD5
4d37a0c0108842decf8ded9321dfba68
-
SHA1
85d7701139000cbf5242cdba48ed72c1d77e612b
-
SHA256
91b979905d8a21ec7a65c258da7d8d31d818e58c1f2e9ea1b8650caa9d3e7aa1
-
SHA512
e444eb8c6c14211e0c2917a404a404ca58e48798c26c2b2e693d8d896d5c8e669ecd00bca873dae00ca7cb3173c80619036a443813de7e6f643e4d8211851c87
-
SSDEEP
3072:73s1asGPffZ8yx/BpEEzVt8owl3IWHpVIw16+UXrKFZGj:Dsu8yx/kqVmTl3/JVIwo3rKFZGj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d37a0c0108842decf8ded9321dfba68_JaffaCakes118
Files
-
4d37a0c0108842decf8ded9321dfba68_JaffaCakes118.exe windows:4 windows x86 arch:x86
d2f99bb18dd65bcd5e17b614e2e692f5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
GetProcAddress
GetModuleHandleA
GetLastError
LockResource
LoadResource
SizeofResource
FindResourceA
LocalAlloc
GetModuleFileNameA
CreateMutexA
OpenMutexA
GetStartupInfoA
user32
GetActiveWindow
MessageBoxA
msvcrt
__getmainargs
??3@YAXPAX@Z
printf
sprintf
memmove
??2@YAPAXI@Z
strncpy
_exit
_XcptFilter
exit
_acmdln
malloc
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 970B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE