Static task
static1
Behavioral task
behavioral1
Sample
db6f20df16640453a5fa35e2a7093eb7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db6f20df16640453a5fa35e2a7093eb7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
db6f20df16640453a5fa35e2a7093eb7_JaffaCakes118
-
Size
364KB
-
MD5
db6f20df16640453a5fa35e2a7093eb7
-
SHA1
92de49d49c4f61af772ee32242fb54449397294e
-
SHA256
c6a15e6e78a2f37911093e6c51aca2d2f4f6fa281b70feba7bcf9d1f315b2698
-
SHA512
ab219f3f947b6f8184e7938af80c8426d60602bef85e8a3fb3b5a918296f15e7f8cef65f026b14c8f46f050af891217b106570793977e84e953ab9b4a5cb2087
-
SSDEEP
6144:R4XyXMFWRPs8OW452Q0H2DjOnJm6Zy/ZPAQ9gBf:RJMFOkbV5f0H2DeJxZaZPJ+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db6f20df16640453a5fa35e2a7093eb7_JaffaCakes118
Files
-
db6f20df16640453a5fa35e2a7093eb7_JaffaCakes118.exe windows:4 windows x86 arch:x86
b0bd714ed1088832a4de1faaa310da03
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
PulseEvent
GetEnvironmentVariableA
lstrlen
FindResourceA
HeapCreate
CreateMutexA
GlobalUnlock
SetLastError
ExitThread
LoadLibraryA
DeleteAtom
GetModuleHandleA
IsBadStringPtrW
ReleaseMutex
GetACP
TlsGetValue
GlobalFree
CreateFileA
FindClose
CloseHandle
user32
FillRect
GetIconInfo
CopyRect
GetDlgItem
DefWindowProcW
IsWindow
CallWindowProcA
SetFocus
DrawMenuBar
DrawEdge
DispatchMessageA
CheckRadioButton
GetDC
msasn1
ASN1BERDecNull
ASN1BERDecCheck
ASN1BERDecBool
ASN1BEREncBool
ASN1BEREncEoid
dpnet
DirectPlay8Create
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 356KB - Virtual size: 356KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ