Static task
static1
Behavioral task
behavioral1
Sample
ac57b72b5af73de84604b50d21eeb24e_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ac57b72b5af73de84604b50d21eeb24e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ac57b72b5af73de84604b50d21eeb24e_JaffaCakes118
-
Size
815KB
-
MD5
ac57b72b5af73de84604b50d21eeb24e
-
SHA1
7f7a6cca21624f278c27da5400aa6e39a765a4f0
-
SHA256
4f23c551401b097fc5258fd206f4f82dc5629cb22deebd23e129a8fc44c6b651
-
SHA512
48fecaecc42663864571032d8b35d2d8a40ced242e1334d5d3026388c708807b125e27462504b369facd061910c5111210d645bcd8218e395dcc795439456fd0
-
SSDEEP
24576:WHEmTKQ8Lo7yBrdK8WNovBYneqL7pcQ0SBH:WHF+wyddl15IeqL7pLpBH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac57b72b5af73de84604b50d21eeb24e_JaffaCakes118
Files
-
ac57b72b5af73de84604b50d21eeb24e_JaffaCakes118.exe windows:4 windows x86 arch:x86
3967014637409a185177d5d625832f5c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalLock
Sleep
GlobalUnlock
TlsGetValue
FreeEnvironmentStringsA
LocalFree
CloseHandle
SetupComm
HeapCreate
GetModuleHandleA
CreateFileA
GetACP
FindClose
FindAtomA
LoadLibraryExW
GetLastError
ExitProcess
lstrlenA
CreateFileMappingA
CreateMutexA
user32
CheckRadioButton
IsWindow
CallWindowProcA
GetDC
CopyRect
GetFocus
DispatchMessageA
DrawMenuBar
DrawEdge
GetIconInfo
FillRect
DefWindowProcW
GetDlgItem
MessageBoxA
uxtheme
DrawThemeEdge
DrawThemeIcon
GetThemeRect
GetThemeSysInt
DrawThemeText
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ