Static task
static1
Behavioral task
behavioral1
Sample
65322d477a4238ea49b3d7094f7ac269_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
65322d477a4238ea49b3d7094f7ac269_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
65322d477a4238ea49b3d7094f7ac269_JaffaCakes118
-
Size
1.1MB
-
MD5
65322d477a4238ea49b3d7094f7ac269
-
SHA1
4ef1c52f4ff6d6e13711551ff1ffa36b1bb3bfb9
-
SHA256
b29125228bad211aee3ea7b6fa9dc7753d61a9341359fb619caf1bc384154181
-
SHA512
b7eec4f2d4946494962de3073351f57a6ae9559db246867430cc0fbee499c1624c50334189e1a0be4c5e91007a5b8f41a95b3e484044fdf03be63a4cd1d1ea8a
-
SSDEEP
24576:7GQk//M9wnIrm4wSm5Hn1Uz5yt/LKuIsES1JAxlhDRE:7Nk3M9wnwm5He5yt/LisEeJklhV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 65322d477a4238ea49b3d7094f7ac269_JaffaCakes118
Files
-
65322d477a4238ea49b3d7094f7ac269_JaffaCakes118.exe windows:4 windows x86 arch:x86
4990e42b35910f79b1a9555a3bd3f41c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
comctl32
InitCommonControls
gdi32
CreateSolidBrush
msvcrt
memmove
ole32
CoInitialize
shell32
ShellExecuteExA
user32
GetClassNameA
MessageBoxA
Sections
.code Size: - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.KMS0 Size: - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.KMS1 Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE