Static task
static1
Behavioral task
behavioral1
Sample
a0b04ec9b54061d1595d0118f1cc50bc_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a0b04ec9b54061d1595d0118f1cc50bc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a0b04ec9b54061d1595d0118f1cc50bc_JaffaCakes118
-
Size
814KB
-
MD5
a0b04ec9b54061d1595d0118f1cc50bc
-
SHA1
6686389c0afbf12a452887774aebf6166e1b72a6
-
SHA256
b4dfe4098a7e168ed1857f2b829707529c39b04713c12b168910c0a9404d9554
-
SHA512
b6de6939e2a15c277b9daec4c810be454964fdd70d86b0d81c4d55c33f5b7ac512ef0381366f8cf1e90df96e9836ac0ec439dbd80b7b15c63ba13a7393c42728
-
SSDEEP
24576:34LBGQhTas2Cmr6QZzLLOyvHw/mLPGLpJGdG:3ZQVBiNZzf5w/cPIJMG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a0b04ec9b54061d1595d0118f1cc50bc_JaffaCakes118
Files
-
a0b04ec9b54061d1595d0118f1cc50bc_JaffaCakes118.exe windows:4 windows x86 arch:x86
edd74820791caedcd26b6fcb46e2b76e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
CreateFileA
FindClose
GetLastError
GetACP
LoadLibraryExA
Sleep
HeapCreate
FindAtomA
GetConsoleAliasW
GlobalUnlock
TlsGetValue
LocalFree
GetModuleHandleA
CloseHandle
LocalLock
WaitNamedPipeA
FreeEnvironmentStringsA
CreateFileMappingA
GetConsoleCP
user32
GetFocus
DrawEdge
GetDC
CallWindowProcA
CopyRect
GetDlgItem
IsWindow
FillRect
DefWindowProcW
GetIconInfo
DispatchMessageA
DrawFrame
CheckRadioButton
MessageBoxA
clbcatq
InprocServer32FromString
SetSetupOpen
GetCatalogObject
GetComputerObject
SetSetupSave
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ