Static task
static1
Behavioral task
behavioral1
Sample
bd1e1d1c40849e1a7fe5db36ea4c2b69_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bd1e1d1c40849e1a7fe5db36ea4c2b69_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bd1e1d1c40849e1a7fe5db36ea4c2b69_JaffaCakes118
-
Size
89KB
-
MD5
bd1e1d1c40849e1a7fe5db36ea4c2b69
-
SHA1
0b5bd5afcaea442fcdde7f93e0dbec904b897f71
-
SHA256
a1aa539211c118862183bca922ff38387be06cb8d7bcc02319f62013fc764edd
-
SHA512
ddb234a8493d40492c4d74d0896705a99fb6591771c08b89c567087a9e38584ed8f07b0cc4383f790180e8b10a34b94346e2bca34b4dafc0cf3e4433f6453a6c
-
SSDEEP
1536:vMRC3XxsstK4t/WFTIv/3wwdt3qNRNCIefRpnWIB7QOCZ18xxjwRqXYWm:0UXxsTAW4uCR3QVq+x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd1e1d1c40849e1a7fe5db36ea4c2b69_JaffaCakes118
Files
-
bd1e1d1c40849e1a7fe5db36ea4c2b69_JaffaCakes118.exe windows:4 windows x86 arch:x86
8aeb2a995688b2e0e80f91a7daade70c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalLock
IsBadReadPtr
VirtualProtectEx
GetConsoleTitleA
lstrlenA
GetStdHandle
GetSystemTime
SetLastError
ResetEvent
EnumResourceTypesW
CloseHandle
CreateMutexA
GetLastError
LoadLibraryExW
Heap32First
CancelIo
GetModuleHandleA
IsDebuggerPresent
LocalFree
FreeConsole
user32
GetDlgItemTextA
DialogBoxParamA
CreateWindowExA
GetKeyState
GetDlgItemInt
GetParent
CloseWindow
GetMessageA
EndDialog
IsIconic
GetMessageA
EnumWindows
CopyImage
MessageBoxA
setupapi
MyMalloc
SetupCloseLog
MyRealloc
MyFree
IsUserAdmin
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ