Static task
static1
Behavioral task
behavioral1
Sample
63eefdc00e193d1bbdffd067d480b1bc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
63eefdc00e193d1bbdffd067d480b1bc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
63eefdc00e193d1bbdffd067d480b1bc_JaffaCakes118
-
Size
364KB
-
MD5
63eefdc00e193d1bbdffd067d480b1bc
-
SHA1
18e028ab3f433e7d5dfc5f2b4e98ae89fc821ae8
-
SHA256
91e145e3b64ec0369802830bdd922fbc19f0d5d19a4700a4f8e835356c876eee
-
SHA512
e834588f59cb9966a70bffeaecf5a45015368ce491b11a7864838451400a9a7a56faf1cfcf52453daded2fad89e3daf592d73533cead115878473dd65d4d0514
-
SSDEEP
6144:xfyXMFWRPs8OW452Q0H2DjOnJm6Zy/ZPAQ9gBf:EMFOkbV5f0H2DeJxZaZPJ+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 63eefdc00e193d1bbdffd067d480b1bc_JaffaCakes118
Files
-
63eefdc00e193d1bbdffd067d480b1bc_JaffaCakes118.exe windows:4 windows x86 arch:x86
7d92ddea1bf8fd97ba8339029a8f4ca0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
CreateFileA
LoadLibraryA
HeapCreate
ExitThread
DeleteAtom
CreateMutexA
SetLastError
GetEnvironmentVariableA
TlsGetValue
FindClose
CloseHandle
GlobalUnlock
GlobalFree
ReleaseMutex
PulseEvent
FindResourceA
lstrlen
IsBadStringPtrW
GetModuleHandleA
user32
DispatchMessageA
GetIconInfo
IsWindow
DefWindowProcW
GetDlgItem
CallWindowProcA
SetFocus
FillRect
CopyRect
DrawMenuBar
GetDC
DrawEdge
CheckRadioButton
msasn1
ASN1BEREncEoid
ASN1BEREncBool
ASN1BERDecBool
ASN1BERDecNull
ASN1BERDecCheck
dpnet
DirectPlay8Create
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 356KB - Virtual size: 356KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ