Static task
static1
Behavioral task
behavioral1
Sample
5bd0260c064e35edd9954eab5bd778fd_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5bd0260c064e35edd9954eab5bd778fd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5bd0260c064e35edd9954eab5bd778fd_JaffaCakes118
-
Size
54KB
-
MD5
5bd0260c064e35edd9954eab5bd778fd
-
SHA1
e8e1063452b5fd9a3c9b541066627b5ae1a0995f
-
SHA256
2bcf18d6728d294dd26b8932c6aed8045c7a71281ab2fcdc1a730632c824f56f
-
SHA512
debeece708e5c9a4c7133d8c4d7e8dbc7a58da038f10ee9dfca93fc75a103170290c65481aec294787776ccc38bedc32fb25cb47717767189363a2f9303ca85d
-
SSDEEP
768:bV6e3XH7SsalqCp1JvinqfOfor1BSP7Bpbel0XgbMnWh/wDUy1qFofIr:bV6EeJvyFVeu3nCycD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5bd0260c064e35edd9954eab5bd778fd_JaffaCakes118
Files
-
5bd0260c064e35edd9954eab5bd778fd_JaffaCakes118.exe windows:4 windows x86 arch:x86
4863c447222ea1bf132393d436580a88
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EmptyClipboard
DrawIcon
DrawCaption
DialogBoxParamA
DestroyCaret
CreateIconFromResourceEx
CreateIcon
CreateCursor
CreateAcceleratorTableA
CopyRect
CharUpperBuffA
CharToOemBuffA
CharPrevA
CharNextA
ChangeMenuA
BeginPaint
kernel32
GetLocalTime
lstrlenA
lstrcpynA
lstrcmpiA
lstrcmpA
WriteFile
UnmapViewOfFile
TlsSetValue
SetCurrentDirectoryA
ReadFile
LocalAlloc
LeaveCriticalSection
GetVersionExA
GetVersion
GetSystemTime
GetPrivateProfileStringA
GetModuleHandleA
ExitThread
Sections
.text Size: 14KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ