Static task
static1
Behavioral task
behavioral1
Sample
8a791d89fece2538dbd9a465435cabed_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8a791d89fece2538dbd9a465435cabed_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8a791d89fece2538dbd9a465435cabed_JaffaCakes118
-
Size
69KB
-
MD5
8a791d89fece2538dbd9a465435cabed
-
SHA1
68d1368a32b6127bd7accaf4e47859c308b5a622
-
SHA256
fa801494d8d78efd6ca125af85cd64482d96aa9e50278ff237d80cbe6e338b8e
-
SHA512
fedfa5c39229452289fe95b555d8052b07254285afe2b0078fe424cb1e4421da3308c25b101c784806947772458a7000e27586d23ac69e5382d2266d35534f16
-
SSDEEP
1536:6EWah6c3HeUaUmcKa7ukqkh4868uUaEJG88dcPhihxjy0+4KaAxi:FT6uIxjc4pAA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8a791d89fece2538dbd9a465435cabed_JaffaCakes118
Files
-
8a791d89fece2538dbd9a465435cabed_JaffaCakes118.exe windows:4 windows x86 arch:x86
ab563389cf179dd54715b17d2a3b0cf2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetBkColor
SetTextColor
GetStockObject
user32
SendMessageA
RegisterClassExA
PostQuitMessage
MoveWindow
MessageBoxA
TranslateMessage
LoadCursorA
GetMessageA
GetCursorPos
DispatchMessageA
DefWindowProcA
CreateWindowExA
LoadIconA
kernel32
lstrcatA
WriteProcessMemory
VirtualAllocEx
Sleep
SizeofResource
SetThreadContext
RtlZeroMemory
ResumeThread
ReadFile
CloseHandle
CreateProcessA
ExitProcess
FindResourceA
GetModuleFileNameA
GetModuleHandleA
GetStartupInfoA
GetThreadContext
LoadResource
LockResource
ntdll
ZwUnmapViewOfSection
Sections
.text Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE