Static task
static1
Behavioral task
behavioral1
Sample
86e068c2f481ed3235748cde702aeca3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
86e068c2f481ed3235748cde702aeca3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
86e068c2f481ed3235748cde702aeca3_JaffaCakes118
-
Size
40KB
-
MD5
86e068c2f481ed3235748cde702aeca3
-
SHA1
277ec5216f2e89f6cab0fcd028ee1b732f5c0d63
-
SHA256
296a84fce06b4c246eaacda555748ca5bbd5483fb9d5b82ca1ed2b9e388613e8
-
SHA512
cd97f1b7241e6ce443dfd7f7991aa5f308590d592dc8671ba8a44f9322890c249d86057998926b94b35d03483d13896d38cf34c4c9ebfdd670c7b060d4225d11
-
SSDEEP
96:iGzWecJIh8jbEPvtz7wBR+fNftcZEN+7jE9+g7N:3Ceb8jb0q3+fNftcZEN+7jC+gZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 86e068c2f481ed3235748cde702aeca3_JaffaCakes118
Files
-
86e068c2f481ed3235748cde702aeca3_JaffaCakes118.exe windows:4 windows x86 arch:x86
782d644a9d573bd02d4252c75a795d82
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryExW
FindClose
CloseHandle
OpenMutexA
GetSystemTime
CreateEventA
lstrlenA
OpenMutexA
GetStdHandle
IsBadReadPtr
FreeConsole
GetLastError
GlobalUnlock
GetACP
ResumeThread
VirtualProtectEx
GlobalLock
FreeEnvironmentStringsA
LocalFree
user32
IsIconic
GetMessageA
GetMessageA
EndDialog
DialogBoxParamA
LoadCursorA
GetComboBoxInfo
GetDlgItemTextA
CreateWindowExA
ClipCursor
IsMenu
SetFocus
GetSubMenu
MessageBoxA
msasn1
ASN1DecAlloc
ASN1BERDecCheck
ASN1BEREncOpenType
ASN1BEREncNull
ASN1BERDecBool
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ