Static task
static1
Behavioral task
behavioral1
Sample
7411a8f0375e32559224fee0940e6073_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7411a8f0375e32559224fee0940e6073_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7411a8f0375e32559224fee0940e6073_JaffaCakes118
-
Size
146KB
-
MD5
7411a8f0375e32559224fee0940e6073
-
SHA1
8da73611093edcf5c4af429caaac3a4952c36848
-
SHA256
5abb0074ada253c29d95bb2b7fad61b06168c5aef946bcb29b7da9849d2d778c
-
SHA512
b2aff8f5f1931762aeb85ecc2f1d49740b5df08bc7c74e06a8b922faf818c750f010a1c0fd2a593110e9058233e20f159d6217d81760238ea1f5abf3757a63c7
-
SSDEEP
3072:E/R02Vho8HlL1pzXaKcJtq5Hc26kycUsTUmI9Ti0fHRPWp:EqazqJtq5826knUsdIVNf9s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7411a8f0375e32559224fee0940e6073_JaffaCakes118
Files
-
7411a8f0375e32559224fee0940e6073_JaffaCakes118.exe windows:4 windows x86 arch:x86
a3ff9c5eac580059dcff5d78c82d980e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThread
TlsSetValue
LocalAlloc
DeleteFileA
GetBinaryTypeA
GetVersion
lstrcatA
GlobalMemoryStatus
SetErrorMode
CreateThread
TlsAlloc
Beep
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetProcAddress
LoadLibraryA
IsBadReadPtr
lstrlenA
GetExitCodeThread
GetFileAttributesA
GetUserDefaultLangID
VerLanguageNameA
GlobalAlloc
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
HeapReAlloc
VirtualAlloc
WriteFile
LCMapStringW
RtlUnwind
VirtualFree
HeapCreate
ExitThread
TlsGetValue
SetFileAttributesA
LocalFree
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapAlloc
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
user32
wsprintfA
LoadImageA
FindWindowA
GetUpdateRect
LoadCursorFromFileA
CopyImage
GetDesktopWindow
EnumChildWindows
SetWindowTextA
UpdateWindow
GetWindowTextLengthA
GetWindowTextA
PostMessageA
GetQueueStatus
gdi32
GetObjectType
DeleteDC
DeleteObject
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ