Static task
static1
Behavioral task
behavioral1
Sample
a8daf903e89b7f36a0e573633e2d3528_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a8daf903e89b7f36a0e573633e2d3528_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a8daf903e89b7f36a0e573633e2d3528_JaffaCakes118
-
Size
367KB
-
MD5
a8daf903e89b7f36a0e573633e2d3528
-
SHA1
e43549b6771b0f3d2805e1aa49fa6dcab9a6164b
-
SHA256
3b79d9afb7862b71491cdc3ec3cf3628abb4c0820eb7a392bc7abc2483257490
-
SHA512
5aa35bce179f029a499b03f65f399bf6225fcf8176ee59a381e055ee1fc4155a12be5171609792c3a83e18bb53a9a9065f2f78daf13c19290cf2ca424da8eec7
-
SSDEEP
6144:WeoVSHv7J0ziq5XdL6wa5x3LyftRFQuh6Dji8Q1WvE2f8sdkC6:+cHlReXpPFrUvJf8Rf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a8daf903e89b7f36a0e573633e2d3528_JaffaCakes118
Files
-
a8daf903e89b7f36a0e573633e2d3528_JaffaCakes118.exe windows:4 windows x86 arch:x86
44ff4377e78597fe496d1112af177b0c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
PulseEvent
GlobalUnlock
Sleep
SetLastError
FindClose
CloseHandle
CreateFileW
lstrcpyA
GetCommandLineA
LoadLibraryExW
LocalFree
GetComputerNameA
lstrlenA
GetModuleHandleA
UnmapViewOfFile
CreateProcessA
FindResourceW
HeapCreate
GetCurrentThreadId
GetCurrentDirectoryA
user32
CallWindowProcA
CreateWindowExA
GetCaretPos
IsWindow
SetFocus
DrawMenuBar
CreateIcon
GetDlgItem
DispatchMessageA
GetDC
DrawEdge
CheckRadioButton
FillRect
rsaenh
CPHashData
CPDeriveKey
CPGenKey
CPSignHash
CPDecrypt
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 292KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 291KB - Virtual size: 292KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ