Static task
static1
Behavioral task
behavioral1
Sample
6080b57a265cc332e17c6cebce2ebad7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6080b57a265cc332e17c6cebce2ebad7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6080b57a265cc332e17c6cebce2ebad7_JaffaCakes118
-
Size
40KB
-
MD5
6080b57a265cc332e17c6cebce2ebad7
-
SHA1
a92d73582e9e293852f09ae734031c1d68539863
-
SHA256
2c2b498f557bce85ab2e14a9ce44214907fa084afe9aff59021ac06682a57c15
-
SHA512
6e0fd08fbdcf5d26ea4d818ff724b1d9bfc19cadda57982368c6def78cbfe15b78e76b8070a2405090f8837051c858b2fb918944d51d63ff3a5c09116adf08ea
-
SSDEEP
768:lA6bU8dDluDJ/ooreTvc6n2tr/F80JF1jRNPp1PvPI4sw9Hxb:lA6QSl+NLebcxtr/m0VRNR1Vd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6080b57a265cc332e17c6cebce2ebad7_JaffaCakes118
Files
-
6080b57a265cc332e17c6cebce2ebad7_JaffaCakes118.exe windows:4 windows x86 arch:x86
adfe3439084c7aa7cb4fbcae96d9b9f5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
CreateHardLinkA
GetUserDefaultLangID
GlobalLock
ClearCommBreak
GetOEMCP
GetProcessHeap
GetTapeStatus
GetCommState
ExitProcess
GlobalFree
EnterCriticalSection
GetStdHandle
FormatMessageA
GetVolumePathNameA
GetModuleHandleA
CreateJobSet
FindAtomA
CloseHandle
GlobalFlags
GetProfileStringA
user32
EndPaint
BeginPaint
ShowWindow
ValidateRect
RegisterClassA
GetForegroundWindow
GetFocus
GetParent
IsIconic
GetWindow
GetClassInfoExA
GetClassNameA
DrawEdge
CloseWindow
GetWindowTextA
GetWindowTextLengthA
GetActiveWindow
ReleaseDC
GetDC
gdi32
GetColorSpace
CombineRgn
CreateDIBitmap
GetCharWidthA
CreateDCA
lpk
LpkInitialize
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE