Static task
static1
Behavioral task
behavioral1
Sample
fd651c44a718c493be48c8ac2383a6b4_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fd651c44a718c493be48c8ac2383a6b4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fd651c44a718c493be48c8ac2383a6b4_JaffaCakes118
-
Size
93KB
-
MD5
fd651c44a718c493be48c8ac2383a6b4
-
SHA1
281108e6dc26312ef9d94a90158136fb1a0e182e
-
SHA256
37b9f2883774a839cdced137f3d4b0e1cc4aafc726dcbd552d0b01bbc2ad15a7
-
SHA512
810d0538d4a33e7f19ac58f502e232a4d3816fbbbb9f206e456290b29e9d5baf6b1ddca5f9b5903df77a0c0af90b9c534ce3cbc8cc16704ff9929d9b5c0a448d
-
SSDEEP
1536:9BRkBJ0OTNnlIKdRGiWSsZQDU2eHGN6gJVS5EXgGNwOVO8rfnqCxrZJbm/hY:TRk7DTwZSsSDheapJoELNw41VxXuY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fd651c44a718c493be48c8ac2383a6b4_JaffaCakes118
Files
-
fd651c44a718c493be48c8ac2383a6b4_JaffaCakes118.exe windows:4 windows x86 arch:x86
a8c79d2c586453d0f859141a9256dae9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DispatchMessageA
DestroyWindow
DestroyIcon
DestroyCursor
DestroyCaret
DefDlgProcA
CreatePopupMenu
CreateMenu
CreateIconFromResourceEx
CreateDialogIndirectParamA
CreateDesktopW
CreateDesktopA
CopyRect
CharUpperBuffA
ChangeMenuA
BeginPaint
ActivateKeyboardLayout
kernel32
GetCommandLineA
lstrcpynA
lstrcmpiA
WriteFile
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
SetEndOfFile
SetCurrentDirectoryA
OpenFile
LocalAlloc
GetVersionExA
GetVersion
GetTimeFormatA
GetSystemTimeAsFileTime
GetStartupInfoA
GetPrivateProfileStringA
CloseHandle
EnumResourceLanguagesA
ExitThread
GetDateFormatA
GetLocalTime
GetModuleHandleA
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE