Static task
static1
Behavioral task
behavioral1
Sample
8a54e31845bfb7320dafb6a69db87d40_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
8a54e31845bfb7320dafb6a69db87d40_JaffaCakes118
-
Size
83KB
-
MD5
8a54e31845bfb7320dafb6a69db87d40
-
SHA1
bb2e02630671424ac61b2237874d0a2225a14fdb
-
SHA256
56e556b08119107cfd01221b077e2a70b1767922498a2f7ed3a6b079106d24c3
-
SHA512
76abd13257783c40df5a8257de22c40f57ccf6d55fa3eaf9b1949eb8981f53de921ce421442b1645e2a86aa96850aa6600ece55509404e12a67c9fd159f719a7
-
SSDEEP
1536:ufi60zGCPt3gojSTNWMg3NL5BiDWHTFSfsaRMhfdnjGr8b:ufeFgoWQMoNgWUlMXjGY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8a54e31845bfb7320dafb6a69db87d40_JaffaCakes118
Files
-
8a54e31845bfb7320dafb6a69db87d40_JaffaCakes118.exe windows:4 windows x86 arch:x86
e65cb10672d203fd13eeffc1620d9c53
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalUnlock
HeapReAlloc
InterlockedExchange
GetUserDefaultLangID
GlobalSize
GetTickCount
GetModuleHandleA
GetVersion
GetConsoleCP
lstrlenA
GetAtomNameA
CloseHandle
GetCommandLineA
WaitForMultipleObjects
CompareFileTime
ResumeThread
WaitForSingleObject
VirtualProtect
GetConsoleDisplayMode
LoadLibraryExA
HeapCreate
user32
SetForegroundWindow
BeginPaint
EndPaint
GetTitleBarInfo
GetFocus
wsprintfA
DrawTextA
CreateIcon
ShowWindow
FillRect
CloseWindow
GetCursorPos
GetClassNameA
GetParent
GetDC
GetWindow
DragDetect
ReleaseDC
FrameRect
rastapi
DeviceListen
DeviceConnect
DeviceDone
AddPorts
PortClose
quartz
DllGetClassObject
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qcaytib Size: 4KB - Virtual size: 24KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE