Static task
static1
Behavioral task
behavioral1
Sample
f58fdb4029ddbd6100e8a166f6d18c71_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f58fdb4029ddbd6100e8a166f6d18c71_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f58fdb4029ddbd6100e8a166f6d18c71_JaffaCakes118
-
Size
254KB
-
MD5
f58fdb4029ddbd6100e8a166f6d18c71
-
SHA1
85b986aee1b73de8cb72bb291bf70b75d467374c
-
SHA256
15f5ff38838409735bd7f035d47716e1dfcc1e4770b7f3c9726bf687e0217efe
-
SHA512
37263a9124c0df7d90fef89c7f2b29f22ed60b6eaa690933e498f617a6d85649c976ccea3866aa23eb2749ddba1b90a532ee49d28faaec2c2b161ae6db4a98f2
-
SSDEEP
6144:GeoLuxfkzFZtUTxCOHuDJkf9HEtbRHn1vsMHZM287mOHJw:wLuJ84jVf9HMdsMa2yw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f58fdb4029ddbd6100e8a166f6d18c71_JaffaCakes118
Files
-
f58fdb4029ddbd6100e8a166f6d18c71_JaffaCakes118.exe windows:10887 windows x86 arch:x86
dc9a7ff1c2c51773abf4522d734b33fa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetCurrentThreadId
LeaveCriticalSection
Sleep
VirtualAlloc
UnhandledExceptionFilter
FreeLibrary
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
SetFilePointer
WaitForSingleObject
LocalAlloc
GetCurrentThreadId
LocalFree
GetCommandLineA
user32
GetSystemMenu
DispatchMessageW
GetMessageW
DrawTextW
IsWindowVisible
GetSystemMetrics
MapWindowPoints
FillRect
KillTimer
IsWindowVisible
LoadStringA
IsIconic
EnableWindow
SystemParametersInfoW
ShowWindow
KillTimer
PtInRect
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 239KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ