Static task
static1
Behavioral task
behavioral1
Sample
74bec08e8ea9f2462c4113742d58371b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
74bec08e8ea9f2462c4113742d58371b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
74bec08e8ea9f2462c4113742d58371b_JaffaCakes118
-
Size
168KB
-
MD5
74bec08e8ea9f2462c4113742d58371b
-
SHA1
7dfd6b17a0173288d7ea1276a195b1382bbdafe6
-
SHA256
435e544e9ad9c8467493839a04f4fc8b62d3d496fee6d90f3106f8c36eaf5995
-
SHA512
468471f625ff80a155c97417acba1ec12341f302a55460cccfe93198f657da3485c86442298b1b859c4d568108e68f47b76b1053cf5477f76478a18a58fac00b
-
SSDEEP
3072:FUdo2Ikz/Kf4fvD0b+8rHNI/o8zUhJIOxX669D4/15DxG7ls19+PHQ9:uO2IWKf4fvC+au/sPhonDouaPHQ9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 74bec08e8ea9f2462c4113742d58371b_JaffaCakes118
Files
-
74bec08e8ea9f2462c4113742d58371b_JaffaCakes118.exe windows:4 windows x86 arch:x86
b07bedc6a39a1fde5e7c8533e3ad455f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
FreeLibrary
SystemTimeToFileTime
GetNextVDMCommand
LocalFileTimeToFileTime
SetThreadPriority
FindResourceW
FileTimeToLocalFileTime
SetCurrentDirectoryW
GetStringTypeW
CompareStringA
FindFirstFileW
GetLocalTime
EnumResourceNamesW
FindClose
FileTimeToSystemTime
SetErrorMode
LoadResource
RegisterWaitForSingleObject
SetEnvironmentVariableW
GetShortPathNameW
FindNextFileW
SearchPathW
user32
ValidateRect
SetCapture
RealGetWindowClassA
ValidateRgn
InvalidateRgn
GetCapture
ReleaseCapture
ExcludeUpdateRgn
GetUpdateRgn
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imul Size: 1024B - Virtual size: 376KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ