Static task
static1
Behavioral task
behavioral1
Sample
a844b74f3ab5288d2a4ecde268ee917c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a844b74f3ab5288d2a4ecde268ee917c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a844b74f3ab5288d2a4ecde268ee917c_JaffaCakes118
-
Size
814KB
-
MD5
a844b74f3ab5288d2a4ecde268ee917c
-
SHA1
854f8dbc862be8dd0052e611736624469d5d0feb
-
SHA256
2420b9e67ffa5ab415846b24c760552e44145f58a1f18c5d7a0a1698992b49b4
-
SHA512
739331677ac7958acd52350ebc190731bfe13dc7a38535733e6c11f193346ec311145d61bd0be5eeaedb220ea92385e24895e0bf1d27e8412c5dd74a5240c0af
-
SSDEEP
24576:2djgD/Ylg+8r3mJkmIFJqy9iua6vqELr/70+L:RDAC+M4/OJ19i6vt/7PL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a844b74f3ab5288d2a4ecde268ee917c_JaffaCakes118
Files
-
a844b74f3ab5288d2a4ecde268ee917c_JaffaCakes118.exe windows:4 windows x86 arch:x86
0330301dd60c43de92dff032f935c944
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapDestroy
LocalUnlock
ReleaseMutex
LoadLibraryExW
FreeEnvironmentStringsA
GlobalFree
FindResourceA
TlsGetValue
UnmapViewOfFile
FindClose
SetLastError
HeapCreate
GetLastError
ExitThread
CreateFileA
Sleep
SetConsoleCursorInfo
GetModuleHandleA
CreateMutexA
GetACP
user32
DrawEdge
CheckRadioButton
IsWindow
CallWindowProcA
DefWindowProcW
GetIconInfo
GetFocus
GetDC
DrawMenuBar
GetDlgItem
DispatchMessageA
CopyRect
FillRect
uxtheme
DrawThemeText
DrawThemeEdge
GetThemeRect
GetThemeSysInt
DrawThemeIcon
clbcatq
SetupOpen
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ