Static task
static1
Behavioral task
behavioral1
Sample
630cd5995216a80fa7e219c918e73699_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
630cd5995216a80fa7e219c918e73699_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
630cd5995216a80fa7e219c918e73699_JaffaCakes118
-
Size
392KB
-
MD5
630cd5995216a80fa7e219c918e73699
-
SHA1
9dc2f28229dce87bd85115143e1a9da61638ad04
-
SHA256
b16f09843e680fdd61fc9e438589b62677dd473c37b1d784a532af3ade3b808c
-
SHA512
e35aae0f3c54983e2faa8f0606b4663290ab8904d9c8874e5f1cc3722480c183b240f023b850eb006906deed3eac93451299aed3f146670b3880d6885f8b994e
-
SSDEEP
12288:IDXUyau9eyDi8Zwb2FJxjTwQN5fg1Eth6XEb:4R9eyWKwkJxruLUb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 630cd5995216a80fa7e219c918e73699_JaffaCakes118
Files
-
630cd5995216a80fa7e219c918e73699_JaffaCakes118.exe windows:4 windows x86 arch:x86
97660400c2f4b1f03ee81acde996e6c0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeEnvironmentStringsA
GetACP
SetLastError
CreateFileA
CreateMutexA
HeapCreate
ExitProcess
GlobalFree
IsBadCodePtr
FindClose
UnmapViewOfFile
GetLastError
LocalUnlock
FindResourceA
LoadLibraryExA
SetVolumeMountPointA
FreeConsole
TlsGetValue
HeapDestroy
GetModuleHandleA
user32
CopyRect
DrawMenuBar
GetIconInfo
GetFocus
FillRect
CheckRadioButton
DrawEdge
GetDC
DefWindowProcW
CallWindowProcA
GetDlgItem
DispatchMessageA
IsWindow
uxtheme
DrawThemeText
GetThemeSysInt
DrawThemeEdge
DrawThemeIcon
GetThemeRect
clbcatq
SetupOpen
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ