Static task
static1
Behavioral task
behavioral1
Sample
71da49c5afeef7543be3ed81c13c05b0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
71da49c5afeef7543be3ed81c13c05b0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
71da49c5afeef7543be3ed81c13c05b0_JaffaCakes118
-
Size
100KB
-
MD5
71da49c5afeef7543be3ed81c13c05b0
-
SHA1
8f3d826b9e3dec626f323282a51549dd04d1bbae
-
SHA256
2bfab41f2bfa078d2b2a3a552080fc1f8758b1a5c075867afa166a2d9450d200
-
SHA512
13ee2bf5416712d480b084517c032e52250c0754aceb86873db70de3a351fee94b500ecd5a917f7dc94c5e5ae3422ad138c45c2dd671fdd252903f292125ea55
-
SSDEEP
1536:hFYvSLkXRWvXH81w6Bnk5o0rIet2GvP3DxT2bIGZnuRh8Lhl3:3cE3h6BnkGAIYtXTpgZ84/3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 71da49c5afeef7543be3ed81c13c05b0_JaffaCakes118
Files
-
71da49c5afeef7543be3ed81c13c05b0_JaffaCakes118.exe windows:4 windows x86 arch:x86
b2336ad7cc2748d8831d4bcd0f24b78c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
VirtualQueryEx
SetEvent
WritePrivateProfileSectionA
VirtualAllocEx
LoadLibraryA
GetDefaultCommConfigA
OpenSemaphoreA
GetConsoleCursorMode
SetSystemTimeAdjustment
CancelWaitableTimer
GetStartupInfoA
SetDllDirectoryA
VirtualAlloc
user32
RealGetWindowClass
EnumDisplaySettingsExA
GetWindowTextA
AppendMenuA
GetWindowTextLengthW
AnyPopup
SetTimer
EnumWindows
LoadBitmapW
DefDlgProcA
gdi32
RemoveFontResourceA
Sections
.text Size: 88KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 952B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 696B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 988B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ