Static task
static1
Behavioral task
behavioral1
Sample
fc60818f6010d175138d45c3eedecddd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc60818f6010d175138d45c3eedecddd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fc60818f6010d175138d45c3eedecddd_JaffaCakes118
-
Size
132KB
-
MD5
fc60818f6010d175138d45c3eedecddd
-
SHA1
eee5c439f2cb4d6d525bdc2f088abdc44329e71d
-
SHA256
6ebae712f7cfa2b231237949276adfc000b33e2edfb705da292e02cb14df457c
-
SHA512
e27fb9b29fe0511cbac32f8c591b2e89cc4c9d9b19895b5738bb4248c72c903c3322f0e2ae6b4fb81151c0755acff5aa2423cf050efbb7360a766a345e27514c
-
SSDEEP
3072:4E5FU/8RD4a+7PmccJa7eYVj32wIDi1THJmIFwLXynH:4G+0R8a+z9cuDCbftynH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fc60818f6010d175138d45c3eedecddd_JaffaCakes118
Files
-
fc60818f6010d175138d45c3eedecddd_JaffaCakes118.exe windows:4 windows x86 arch:x86
57065bd3d48577851c2fc6f62d98bd63
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenMutexA
FreeEnvironmentStringsA
VirtualProtectEx
LocalFree
LoadLibraryExW
GlobalLock
CreateEventA
OpenMutexA
IsBadReadPtr
GetStdHandle
GetACP
GetLastError
GetSystemTime
ResumeThread
GetModuleHandleA
FreeConsole
FindClose
lstrlenA
GlobalUnlock
CloseHandle
user32
IsMenu
GetMessageA
GetMessageA
GetSubMenu
ClipCursor
GetComboBoxInfo
GetDlgItemTextA
IsIconic
CreateWindowExA
SetFocus
LoadCursorA
DialogBoxParamA
EndDialog
MessageBoxA
msasn1
ASN1BEREncOpenType
ASN1BERDecBool
ASN1BERDecCheck
ASN1BEREncNull
ASN1DecAlloc
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ