Static task
static1
Behavioral task
behavioral1
Sample
d4f6ecb419267b217b279e07bdf0a00d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4f6ecb419267b217b279e07bdf0a00d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4f6ecb419267b217b279e07bdf0a00d_JaffaCakes118
-
Size
357KB
-
MD5
d4f6ecb419267b217b279e07bdf0a00d
-
SHA1
85614f26ef15fe7b03c71dbd47a9a5bcde4ed47e
-
SHA256
97fde6685b3cd197468e7577404c9b7e5b49e312f602e69cf220a4c600b53e91
-
SHA512
a7b3972ea146387a70840472ede4f8fe8ca13b486e975e72b334a159656d28deb2e669e5b5b4afc63cb754ce4a9fb43cd6d533281d1940a64711a4894d1df9d3
-
SSDEEP
6144:+amEm9nFK7Ax+LYBrtSRbIqz+WSrLGj+wvjG+qhloMHDjFN3rNqR2t:tEMAxQ1bH8azq0SFNU2t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4f6ecb419267b217b279e07bdf0a00d_JaffaCakes118
Files
-
d4f6ecb419267b217b279e07bdf0a00d_JaffaCakes118.exe windows:4 windows x86 arch:x86
3f6957f2e264a53ded6dc9033ef138d0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CancelIo
VirtualProtectEx
CloseHandle
LocalFree
IsDebuggerPresent
LoadLibraryExW
ResetEvent
FreeConsole
GetConsoleTitleA
CreateMutexA
lstrlenA
GetModuleHandleA
EnumResourceTypesW
GetStdHandle
GetSystemTime
SetLastError
GetLastError
Heap32First
GlobalLock
IsBadReadPtr
user32
GetMessageA
EndDialog
GetMessageA
DialogBoxParamA
GetParent
IsIconic
CloseWindow
GetKeyState
EnumWindows
CreateWindowExA
GetDlgItemTextA
GetDlgItemInt
CopyImage
MessageBoxA
setupapi
MyFree
MyRealloc
IsUserAdmin
SetupCloseLog
MyMalloc
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ