Static task
static1
Behavioral task
behavioral1
Sample
872680a907f9a9a9c19c5a9b5e24bd0c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
872680a907f9a9a9c19c5a9b5e24bd0c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
872680a907f9a9a9c19c5a9b5e24bd0c_JaffaCakes118
-
Size
186KB
-
MD5
872680a907f9a9a9c19c5a9b5e24bd0c
-
SHA1
2bb2681d48886a53025c717deaf6d5cb6de4de1a
-
SHA256
33c882146d29c73703bc5b75c9bf872f8c354443a30081b47ea05e784ee18825
-
SHA512
190e3bd75d1621daa1da3652dcd57c1a8e53ee31b92d738506060dd609e880c580ed3cfb6c0095f34b4a2ca033cfe275392dc75deae104f64f492a5e0f684bd7
-
SSDEEP
3072:2OtkMrdAk7JrWR9a7qak0020/EN+AR9HDAoQcCpizfEILHQm6qKYOQ3:2OtLrdAk7d+gmLP2bF4oQjpfRmhZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 872680a907f9a9a9c19c5a9b5e24bd0c_JaffaCakes118
Files
-
872680a907f9a9a9c19c5a9b5e24bd0c_JaffaCakes118.exe windows:4 windows x86 arch:x86
747f8816a9907e3147113d0a12cf1f3c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTime
VirtualAlloc
IsBadReadPtr
CreateEventA
FreeEnvironmentStringsA
GetModuleHandleA
GetACP
LocalFree
GetLastError
GetStdHandle
lstrlenA
LoadLibraryExA
CloseHandle
ResumeThread
GlobalLock
GlobalUnlock
FindClose
OpenMutexA
IsBadCodePtr
GetConsoleCP
user32
IsIconic
GetDlgItemTextA
CreateWindowExA
GetSubMenu
DialogBoxParamA
EndDialog
GetMessageA
SetFocus
RedrawWindow
CheckMenuItem
IsMenu
ClipCursor
GetMessageA
DrawIconEx
wldap32
ldap_unbind
ldap_add
cldap_open
ldap_delete
ldap_compare
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ