Static task
static1
Behavioral task
behavioral1
Sample
8ca218e0cc9895bc5ea6de39479b7f9f_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8ca218e0cc9895bc5ea6de39479b7f9f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8ca218e0cc9895bc5ea6de39479b7f9f_JaffaCakes118
-
Size
357KB
-
MD5
8ca218e0cc9895bc5ea6de39479b7f9f
-
SHA1
f56f46d449a228d866bea5d116455abf91e5f78b
-
SHA256
4ded146450a382fc8e25039127d6f785fe2ab99b2485a1f69f74ca45ea368569
-
SHA512
b998eb2a451fb27b47eda7fc09cfa7199a883df488bbde41ef01661db80c1d0a2377f74422cd2a68358ccb32dbe4214a00a3e58d8ee8a5a81232bd8774ef7948
-
SSDEEP
6144:r3mEm9nFK7Ax+LYBrtSRbIqz+WSrLGj+wvjG+qhloMHDjFN3rNqR2t:zEMAxQ1bH8azq0SFNU2t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8ca218e0cc9895bc5ea6de39479b7f9f_JaffaCakes118
Files
-
8ca218e0cc9895bc5ea6de39479b7f9f_JaffaCakes118.exe windows:4 windows x86 arch:x86
3f6957f2e264a53ded6dc9033ef138d0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CancelIo
VirtualProtectEx
CloseHandle
LocalFree
IsDebuggerPresent
LoadLibraryExW
ResetEvent
FreeConsole
GetConsoleTitleA
CreateMutexA
lstrlenA
GetModuleHandleA
EnumResourceTypesW
GetStdHandle
GetSystemTime
SetLastError
GetLastError
Heap32First
GlobalLock
IsBadReadPtr
user32
GetMessageA
EndDialog
GetMessageA
DialogBoxParamA
GetParent
IsIconic
CloseWindow
GetKeyState
EnumWindows
CreateWindowExA
GetDlgItemTextA
GetDlgItemInt
CopyImage
MessageBoxA
setupapi
MyFree
MyRealloc
IsUserAdmin
SetupCloseLog
MyMalloc
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ