Static task
static1
Behavioral task
behavioral1
Sample
b97e49016d293f3b86291a48df915008_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b97e49016d293f3b86291a48df915008_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b97e49016d293f3b86291a48df915008_JaffaCakes118
-
Size
84KB
-
MD5
b97e49016d293f3b86291a48df915008
-
SHA1
2b4b8694e36c3f96ee21e7dceb34526ba3c44663
-
SHA256
3ec3262416692ad6d8ffc9d856e5b764f44b3417ef1f4fe2842db663c473ab37
-
SHA512
e34dd601f4845a0ed81f8a3d43eb1b17783899339efb91051834c6caf2d85611b9435b3f9a1b30f1c8c9462ae05bde004d4ea7a9550e4bdf179b0bb6dbbc6bf1
-
SSDEEP
1536:nZp3gnqJtNjp4t/WFTIvgzksTfOa3QjQ1sy8U/U2kGl3bFwPoih5:nZpEKdAWAjv2kGJbFwP/h5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b97e49016d293f3b86291a48df915008_JaffaCakes118
Files
-
b97e49016d293f3b86291a48df915008_JaffaCakes118.exe windows:4 windows x86 arch:x86
994af8f35aa9aeb95102009a108dafc0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
GlobalLock
CreateMutexA
lstrlenA
CloseHandle
GetStdHandle
GetSystemTime
GetConsoleTitleW
IsBadReadPtr
LoadLibraryExW
GetACP
VirtualProtectEx
CancelIo
GetLastError
GlobalUnlock
GetCPInfo
FindClose
CreateEventA
FreeConsole
GetModuleHandleA
user32
LoadCursorA
IsIconic
GetDlgItemTextA
CreateWindowExA
GetKeyState
IsMenu
GetMessageA
GetSubMenu
GetParent
EndDialog
ClipCursor
DialogBoxParamA
GetMessageA
MessageBoxA
clbcatq
CheckMemoryGates
SetupSave
GetComputerObject
ComPlusMigrate
GetCatalogObject
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ