Static task
static1
Behavioral task
behavioral1
Sample
dc269d639fa5a8ca9ba16513d9929670_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc269d639fa5a8ca9ba16513d9929670_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc269d639fa5a8ca9ba16513d9929670_JaffaCakes118
-
Size
50KB
-
MD5
dc269d639fa5a8ca9ba16513d9929670
-
SHA1
624283bbf456a2a83ae1a46f641314ec05600da0
-
SHA256
0269d9ad87febc9dfc5c1ada831ffad2e106f912b94b0ebe9b899886308521e9
-
SHA512
e3f7e137ab9c0011314de4f66d3e47202d92296f56b35ceddd94417bd9ec0e73d67b4aae8be9e12c7dfb34a90299c9632983dae3869718f02d00ae2a3b77190d
-
SSDEEP
768:vW+TFQu0JDbi2iyl2MmjALKbLuDzntu1ls/ERLzGvdlnsoaPdIg9:pABxTebLoznM1ls/MOnsbmg9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dc269d639fa5a8ca9ba16513d9929670_JaffaCakes118
Files
-
dc269d639fa5a8ca9ba16513d9929670_JaffaCakes118.exe windows:4 windows x86 arch:x86
13e772805e23fb706665da8a228f1100
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
Process32Next
lstrcmpA
CloseHandle
Process32First
CreateToolhelp32Snapshot
GlobalFree
WriteFile
CreateFileA
lstrcatA
lstrcpyA
GlobalAlloc
LockResource
SizeofResource
LoadResource
FindResourceA
GetModuleHandleA
ReadFile
GetFileSize
GetProcAddress
MoveFileExA
WinExec
GetEnvironmentVariableA
GetPrivateProfileStringA
user32
PostQuitMessage
SendMessageA
DestroyWindow
DispatchMessageA
TranslateMessage
DefWindowProcA
UpdateWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
PeekMessageA
ShowWindow
shell32
ShellExecuteA
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ