Static task
static1
Behavioral task
behavioral1
Sample
b13c6a467a5c2a2d63074ade2256b2d1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b13c6a467a5c2a2d63074ade2256b2d1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b13c6a467a5c2a2d63074ade2256b2d1_JaffaCakes118
-
Size
97KB
-
MD5
b13c6a467a5c2a2d63074ade2256b2d1
-
SHA1
d9c7a18b909c81d015e07ac7d23761549ab9c108
-
SHA256
3b19e7bb4c67f365a124384a9815284003898e93d9035f4de916fdb5d620e833
-
SHA512
f06dfd2f5746597732b387777b378c20f8c4e6914c20730acd2fce57c7a5c80a7c5db5e7cd70d1d5d7789b760f6e29764d56ac9a3ccfd57c2ddcdab5ec89ea0c
-
SSDEEP
1536:zELAKGORFK7/TTx7X3RlUY2iSZfBddgEcbEfO3gIj3mIDLRv+Ox:4LxGORFGR7X3RlUY2iqeBYG7hDLRh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b13c6a467a5c2a2d63074ade2256b2d1_JaffaCakes118
Files
-
b13c6a467a5c2a2d63074ade2256b2d1_JaffaCakes118.exe windows:5 windows x86 arch:x86
2c32c847771e23b4153116ed838a3234
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
lstrcpynA
HeapAlloc
HeapFree
GetProcessHeap
GetVolumeInformationA
GetModuleHandleA
lstrcpyA
FindResourceA
lstrcmpA
lstrlenA
LoadResource
SizeofResource
GetProcAddress
VirtualAlloc
LoadLibraryA
LockResource
VirtualProtect
user32
LoadCursorA
DispatchMessageA
DefWindowProcA
CreateWindowExA
GetWindowLongA
TranslateMessage
LoadIconA
RegisterClassExA
GetMessageA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 822B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 171B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 188B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ