Static task
static1
Behavioral task
behavioral1
Sample
f690f2f9913f78308eef61d5393d89a6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f690f2f9913f78308eef61d5393d89a6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f690f2f9913f78308eef61d5393d89a6_JaffaCakes118
-
Size
240KB
-
MD5
f690f2f9913f78308eef61d5393d89a6
-
SHA1
07b6d37947f3cfee6214534025ebdcf8afc74f16
-
SHA256
faaec7ab1c2641c100a1cd7049c2a69c49ad07c664d76b56036280f919a23ef4
-
SHA512
ff041751592554140f5616ed371a9c2ea1f919952e080f293302389b36e7f0bb096f26ff5312989ea1a41e732fe99884ec4e2db1480fac4157fdfb00a8ed75fd
-
SSDEEP
6144:iNJd7lJ12SZszAd6cb1hcYYMH5BGI0pzIq95cyGLD6Q:iLz2CtdTbQEZBGPIqfqD6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f690f2f9913f78308eef61d5393d89a6_JaffaCakes118
Files
-
f690f2f9913f78308eef61d5393d89a6_JaffaCakes118.exe windows:4 windows x86 arch:x86
b0bcd890058fe8a33274bc7b47794007
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
BuildCommDCBW
SetFileApisToOEM
DeleteAtom
UnmapViewOfFile
SetThreadLocale
WinExec
GetAtomNameA
OpenProcess
EnumSystemLocalesA
GetCommTimeouts
user32
LoadStringA
DrawTextW
RegisterClassA
ExitWindowsEx
GetMenuItemInfoA
GetKeyboardLayoutNameA
GetMessageW
SetWindowsHookW
OemToCharW
SetWindowsHookExW
SendNotifyMessageW
GetMessagePos
gdi32
GetTextExtentExPointA
PlayMetaFileRecord
GetBrushOrgEx
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 810B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 172KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data0 Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE