Static task
static1
Behavioral task
behavioral1
Sample
68ef2d762dbc019f9869f118b5222d51_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
68ef2d762dbc019f9869f118b5222d51_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
68ef2d762dbc019f9869f118b5222d51_JaffaCakes118
-
Size
291KB
-
MD5
68ef2d762dbc019f9869f118b5222d51
-
SHA1
f4a060f82dc271ab3a4de03561657da4b8c507d2
-
SHA256
b47a46b44dfae70ff055e97e46a174a382928aafbe340fa807f2b47e060a2448
-
SHA512
832d81b821168779cc54c3fac160a809f63e1e229305314a8e5d794113db91cbd97e16619e6f323767ede3dbb626b6754450388b550d282ad9288ccbd264ac19
-
SSDEEP
6144:4aaTFTpCA8cUyp2ERRvADdRrxEMH7EYhyqNzW8:4aamlIHg13A8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 68ef2d762dbc019f9869f118b5222d51_JaffaCakes118
Files
-
68ef2d762dbc019f9869f118b5222d51_JaffaCakes118.exe windows:4 windows x86 arch:x86
d652eb5171776bfec4224097c54235b1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CompareStringA
CreateEventA
CreateThread
EnterCriticalSection
ExitThread
GetCurrentProcess
GetLastError
GetStartupInfoA
GetTickCount
GlobalAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
MoveFileW
SetEvent
SetFilePointer
Sleep
WaitForSingleObject
WriteConsoleA
WriteFile
lstrlenA
user32
GetParent
GetShellWindow
GetWindowThreadProcessId
LoadBitmapW
MessageBoxA
SendDlgItemMessageW
SetRect
UnregisterHotKey
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 846B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 277KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ