Static task
static1
Behavioral task
behavioral1
Sample
f59f79144d8662c27c6e12e61bb0d4d9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f59f79144d8662c27c6e12e61bb0d4d9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f59f79144d8662c27c6e12e61bb0d4d9_JaffaCakes118
-
Size
131KB
-
MD5
f59f79144d8662c27c6e12e61bb0d4d9
-
SHA1
f1c212a2075e2dd29c5fab9afbb2e80eb49c3ce4
-
SHA256
2b58881229d9d3a8191336265bc2329f433677600f84252beb5361bdbb12b6c1
-
SHA512
d73f41e1289cdb22b79df82b6927990cb218dbca3d1816cd0d092cace79537a88567b7ae6b562087691f57d5e8d92f9c38d917f9fdd24e6c94dc96a687c07447
-
SSDEEP
3072:kqnheT9tdjkaqDMIUS/eRFaaXctqpyLFOa+Q0u7:kmhixkaqLhWLaMMLFO4f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f59f79144d8662c27c6e12e61bb0d4d9_JaffaCakes118
Files
-
f59f79144d8662c27c6e12e61bb0d4d9_JaffaCakes118.exe windows:4 windows x86 arch:x86
5fc3dc24b9f530dc3b6967fc704b4928
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
GetSystemTime
ResumeThread
OpenMutexA
GetLastError
IsBadReadPtr
OpenMutexA
CloseHandle
GetACP
LocalFree
GlobalLock
FreeEnvironmentStringsA
CreateEventA
GlobalUnlock
lstrlenA
GetStdHandle
GetModuleHandleA
VirtualProtectEx
LoadLibraryExW
FreeConsole
user32
GetSubMenu
GetMessageA
GetDlgItemTextA
ClipCursor
IsIconic
GetMessageA
GetComboBoxInfo
EndDialog
SetFocus
DialogBoxParamA
LoadCursorA
CreateWindowExA
IsMenu
MessageBoxA
msasn1
ASN1BEREncOpenType
ASN1BERDecCheck
ASN1BERDecBool
ASN1BEREncNull
ASN1DecAlloc
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ