Static task
static1
Behavioral task
behavioral1
Sample
82500c17f293091067bcb0a24839f1cd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
82500c17f293091067bcb0a24839f1cd_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
82500c17f293091067bcb0a24839f1cd_JaffaCakes118
-
Size
5KB
-
MD5
82500c17f293091067bcb0a24839f1cd
-
SHA1
6ab4d04f05f3f0d264b167506474bc26e4fabbb3
-
SHA256
c8ff5e5d5ddb17f482240c565df7a60e55dd61b80020053fee19be26f9175fbf
-
SHA512
9430dd457257293dc75c38433ea666c332b32f329ecff4bc13eae4f3c55ad10bb6bb2bd83b6774163c7b0c2184b4ab301317bff688a660030aba324f4f661afc
-
SSDEEP
48:a53xtol9kM8IbEYeCX3YDm3jIS940GH5OEjNhd4Qwuvy1jUHvy4gXwBdxHvBQGKi:5l9knYFX3YD6V9E9Nhd+G6QRHoi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 82500c17f293091067bcb0a24839f1cd_JaffaCakes118
Files
-
82500c17f293091067bcb0a24839f1cd_JaffaCakes118.exe windows:4 windows x86 arch:x86
d5ef0e3408550965e4a69d670642d01c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WaitForSingleObject
CreateEventA
GetCurrentProcessId
FreeLibrary
ReleaseMutex
GetFileAttributesA
GetWindowsDirectoryA
lstrcatA
GetSystemDirectoryA
WideCharToMultiByte
CompareStringA
CreateToolhelp32Snapshot
ExitProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapAlloc
GetProcessHeap
SetEvent
CreateThread
CreateProcessA
ExitThread
Process32Next
Process32First
user32
IsWindowUnicode
GetClassLongA
wsprintfA
CloseWindow
ShowWindow
MsgWaitForMultipleObjects
DispatchMessageA
TranslateMessage
PeekMessageA
CreateWindowExA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE