Static task
static1
Behavioral task
behavioral1
Sample
a0bfbe81463f8ed9f1255966a6117221_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a0bfbe81463f8ed9f1255966a6117221_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a0bfbe81463f8ed9f1255966a6117221_JaffaCakes118
-
Size
281KB
-
MD5
a0bfbe81463f8ed9f1255966a6117221
-
SHA1
bb2930db28c339ba30402156a2b1fa6bb4157ab9
-
SHA256
5ed220d369b4f42190cced2f2da3556c436a68b5488680a1a88623ec7fa28ebd
-
SHA512
25601dabebb774a0d8c08718b3d8c20bfa7d38cbdbf0d40921dd70f9ac56bcf84761d5f657c72af9b47b7a16d43372be6edc8ec0fdb71c8b0593f4a14d08d5ea
-
SSDEEP
6144:ATlFZWs6wfwqAaq9XoEyWoqJ5aKGJAs6dHWtjLstJ426:AFZ+w4qAt5xpjaKGi56sg26
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a0bfbe81463f8ed9f1255966a6117221_JaffaCakes118
Files
-
a0bfbe81463f8ed9f1255966a6117221_JaffaCakes118.exe windows:4 windows x86 arch:x86
f12aa13ad55e3264115877c223f8555d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexA
LoadLibraryExW
LocalFree
GlobalLock
FreeConsole
CancelIo
VirtualProtectEx
ResetEvent
GetLastError
IsBadReadPtr
GetConsoleTitleA
CloseHandle
IsDebuggerPresent
SetLastError
EnumResourceTypesW
lstrlenA
GetSystemTime
GetStdHandle
GetModuleHandleA
Heap32First
user32
GetParent
GetDlgItemInt
GetMessageA
CreateWindowExA
CopyImage
GetDlgItemTextA
IsIconic
GetMessageA
DialogBoxParamA
GetKeyState
EnumWindows
EndDialog
CloseWindow
MessageBoxA
setupapi
MyRealloc
MyFree
MyMalloc
SetupCloseLog
IsUserAdmin
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ