Static task
static1
Behavioral task
behavioral1
Sample
ef46902d951851cf10b50d169facd524_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ef46902d951851cf10b50d169facd524_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
ef46902d951851cf10b50d169facd524_JaffaCakes118
-
Size
32KB
-
MD5
ef46902d951851cf10b50d169facd524
-
SHA1
dc16934fa3f103f803827257617992ec90d40d30
-
SHA256
cc73ee9364d451e72f9b95eef3dfddeeb7056318044a201a5f8b60aaf5c9a844
-
SHA512
bfc44e555fe9ae0cb57977a73daab1c641c09d738a74420722656a545d734c3a33b68d25a5546c0b6dc90ac881b98f6374af56e157aea8bfc4fd01fffeead7a2
-
SSDEEP
768:B8tC9SlPfPfPfPfPfPfPfPfPfPfPfPfPfPfPfPfPfPfPfPfPfPfPfPfPfPfPfPfl:ByPfPfPfPfPfPfPfPfPfPfPfPfPfPfPt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef46902d951851cf10b50d169facd524_JaffaCakes118
Files
-
ef46902d951851cf10b50d169facd524_JaffaCakes118.exe windows:4 windows x86 arch:x86
8f39794a5299c5b4784eedca8777aef2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
ExitProcess
FatalAppExitA
GetLastError
GetModuleHandleA
GetSystemInfo
GetVersionExA
LocalAlloc
WaitForSingleObject
user32
BeginPaint
BlockInput
CharLowerA
CharUpperA
CloseWindowStation
CreateDialogParamA
CreateWindowExA
DefWindowProcA
DispatchMessageA
EndDialog
EndPaint
EnumDisplayMonitors
FindWindowA
FlashWindow
GetAsyncKeyState
GetClassInfoExA
GetMessageA
GetProcessWindowStation
GetTopWindow
LoadCursorA
LoadIconA
MessageBoxA
OpenWindowStationA
RegisterWindowMessageA
SetDlgItemInt
SetFocus
SetWindowTextA
ShowWindow
TranslateMessage
UpdateWindow
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ