Static task
static1
Behavioral task
behavioral1
Sample
a8c6d51511516f8ff2744ffa7b0744e6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a8c6d51511516f8ff2744ffa7b0744e6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a8c6d51511516f8ff2744ffa7b0744e6_JaffaCakes118
-
Size
93KB
-
MD5
a8c6d51511516f8ff2744ffa7b0744e6
-
SHA1
6d2fdd069a572ab7000e6770fa21c0cdc3317980
-
SHA256
da2927ef4b934686590da0365b06468bac1435ec479544853b8e2b259489f814
-
SHA512
165bc512ab438fab944cb6ee9e4b2c6228710dd9c7e48c94ed40b3de5c8ec93046c35ec2ee49efc35b79b42e9b4753d6dfaedc9279cacc0132c8ff87cc1c7428
-
SSDEEP
1536:iDGKAmrOAhUO5Ln4gEB9d+Ii7d6dPUsPvOpa2tPdoqM1gbZEL:iC4N6sb4g0vViJEZv2a2ZdGYmL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a8c6d51511516f8ff2744ffa7b0744e6_JaffaCakes118
Files
-
a8c6d51511516f8ff2744ffa7b0744e6_JaffaCakes118.exe windows:5 windows x86 arch:x86
2242d9413477e71d3a7ebc77186bc1db
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
malloc
memset
memcpy
free
rand
comctl32
ord17
kernel32
GetProcessId
VirtualQuery
GetModuleHandleA
SetEvent
CreateEventA
CloseHandle
WaitForSingleObject
CreateMutexA
ExitProcess
user32
LoadStringA
LoadAcceleratorsA
GetWindowRect
SetTimer
SetScrollRange
GetScrollRange
InvalidateRect
MoveWindow
SetWindowPos
SendMessageA
PostMessageA
CreateWindowExA
DestroyWindow
FindWindowA
ModifyMenuA
MessageBoxA
DestroyMenu
CreateMenu
SetScrollPos
SetScrollInfo
TranslateMessage
TranslateAcceleratorA
GetMessageA
SetWindowTextA
ShowWindow
gdi32
CombineRgn
CreateRectRgn
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ