Static task
static1
Behavioral task
behavioral1
Sample
5e75505747e66a4d7bbe45d754d76575_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5e75505747e66a4d7bbe45d754d76575_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5e75505747e66a4d7bbe45d754d76575_JaffaCakes118
-
Size
271KB
-
MD5
5e75505747e66a4d7bbe45d754d76575
-
SHA1
8e15efcfb7d7ea1b2585a8b3d3c219355ae060f4
-
SHA256
950efdbc9da5be3cad36c7a341e39fcf5e91ae578ded59fecc891f3b018fe1e8
-
SHA512
265f74781fcac087756cae92f303b7dc28e805431ea2afeff345b2950701dd8e88e86af5ca381adeaf4bbc5c549ae2a4dcea4f9dbf3acd6bf61c28762ac3663b
-
SSDEEP
6144:INHok+EhbXvrcaSYi43OksnvfoCbHjkuw4p6CJmuecJpgs5A8f485vL:I15DX62SvQs55ptmVcJas28t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5e75505747e66a4d7bbe45d754d76575_JaffaCakes118
Files
-
5e75505747e66a4d7bbe45d754d76575_JaffaCakes118.exe windows:4 windows x86 arch:x86
0a7cedbd631ba5074ac887d32f4fac47
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
ExitProcess
GetFileTime
GetProcessHeap
OpenProcess
PeekNamedPipe
VirtualFree
VirtualProtectEx
user32
ClipCursor
CloseDesktop
DdeCreateStringHandleA
EnumPropsW
EnumWindows
GetUserObjectInformationA
IMPSetIMEA
LoadCursorA
LoadMenuA
LockWindowStation
ModifyMenuA
RegisterWindowMessageA
SetUserObjectInformationA
SetWindowLongA
SubtractRect
gdi32
CreateColorSpaceW
DrawEscape
GetCharWidthW
GetObjectA
GetTextExtentExPointA
PlgBlt
SetTextJustification
Sections
.text Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 266KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 528KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ