Static task
static1
Behavioral task
behavioral1
Sample
bca9c69036cfdcd258dde107bc8b09ce_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bca9c69036cfdcd258dde107bc8b09ce_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bca9c69036cfdcd258dde107bc8b09ce_JaffaCakes118
-
Size
56KB
-
MD5
bca9c69036cfdcd258dde107bc8b09ce
-
SHA1
b6e0ecf3c9729a06278825a45f7f6b99fc286a18
-
SHA256
9e9b003eb477140580e5349abef695ddc824b60eebb95eb91f9a4a1adf9e5b91
-
SHA512
5bd24c52e774d9c433034dc0927d64191a7f93d5f3b1915bc76523576f6c6280253b0ad0d9afcbbb567c675b6bec0c03f3fa5600b28c2d19b85e17d7d2882830
-
SSDEEP
1536:ffkULNd3NXvXtkiXGpGUmHkgK0OP8CkPB:UctkikKs0oxs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bca9c69036cfdcd258dde107bc8b09ce_JaffaCakes118
Files
-
bca9c69036cfdcd258dde107bc8b09ce_JaffaCakes118.exe windows:4 windows x86 arch:x86
2debd5052d45fae07579e32949b0f22d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
GetPrivateProfileIntA
GetACP
CloseHandle
CreateEventA
FreeEnvironmentStringsA
CreateFileA
GetModuleHandleA
GetConsoleCP
LoadLibraryExA
LocalUnlock
GetLastError
HeapCreate
IsBadReadPtr
GetStdHandle
CreateFileMappingA
lstrlenW
FindClose
IsDebuggerPresent
GlobalLock
user32
CheckMenuItem
GetDC
IsWindow
GetDlgItemTextA
SetFocus
GetDlgItem
GetMessageA
DialogBoxParamA
DispatchMessageA
GetIconInfo
RedrawWindow
GetListBoxInfo
EndDialog
DrawIconEx
uxtheme
DrawThemeIcon
CloseThemeData
EnableTheming
GetThemeColor
GetThemeMetric
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ