Static task
static1
Behavioral task
behavioral1
Sample
b38ee8b59900a0c14b1cc016c014857d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b38ee8b59900a0c14b1cc016c014857d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b38ee8b59900a0c14b1cc016c014857d_JaffaCakes118
-
Size
357KB
-
MD5
b38ee8b59900a0c14b1cc016c014857d
-
SHA1
3eb0c4b9336c36a7ae690f3922865a10a59e2393
-
SHA256
32c9968152f9b5181dcaf4be7af8d134a12b1e65fac5a996674aa81967e9c522
-
SHA512
21ab4918a67710e4c4c945bdaad771f48e9e0709f9b1e34ec3ae0c1c4311ea64f8c55da6bb2633223543102417e0cf3a0dbad45c3cb0cd2807f8551ba84c3fc1
-
SSDEEP
6144:PmRm9nFK7Ax+LYBrtSRbIqz+WSrLGj+wvjG+qhloMHDjFNiu5mn:P7MAxQ1bH8azq0SFNi8U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b38ee8b59900a0c14b1cc016c014857d_JaffaCakes118
Files
-
b38ee8b59900a0c14b1cc016c014857d_JaffaCakes118.exe windows:4 windows x86 arch:x86
ef31d8b52cac52e5e2000c23545e75b2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
GetStdHandle
IsDebuggerPresent
Heap32First
lstrlenA
CreateMutexA
GlobalLock
CancelIo
GetLastError
ResetEvent
LoadLibraryExW
GetModuleHandleA
FreeConsole
EnumResourceTypesW
CloseHandle
GetConsoleTitleA
IsBadReadPtr
GetSystemTime
VirtualProtectEx
LocalFree
user32
IsIconic
GetKeyState
GetMessageA
EnumWindows
CloseWindow
GetMessageA
DialogBoxParamA
CreateWindowExA
CopyImage
GetParent
EndDialog
GetDlgItemTextA
GetDlgItemInt
MessageBoxA
setupapi
IsUserAdmin
SetupCloseLog
MyFree
MyMalloc
MyRealloc
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ