Static task
static1
Behavioral task
behavioral1
Sample
00b5b1ffde4c0058166ebd6eef732f7b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00b5b1ffde4c0058166ebd6eef732f7b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
00b5b1ffde4c0058166ebd6eef732f7b_JaffaCakes118
-
Size
202KB
-
MD5
00b5b1ffde4c0058166ebd6eef732f7b
-
SHA1
662d45fd18733dc339b62c92d110dac07087c853
-
SHA256
e2c6db74a791676f5f6f1369ffe4ec79b2f0b02e11479eb753af92b2434f4d27
-
SHA512
0420039506e8bdf24f22f23bd9be976b3256326d0eb02dabbd2f208e6cf732c49e326fe793322ab6638c2ad422429c278e3c197123f233c219f421565c5ad57f
-
SSDEEP
3072:rEMOgRnjIPrqobVELThqrWEtJ21eJyyHK+fhAqud9hrLKAD5E3:rEXGOqob2ULzz1HyqI9hrp5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00b5b1ffde4c0058166ebd6eef732f7b_JaffaCakes118
Files
-
00b5b1ffde4c0058166ebd6eef732f7b_JaffaCakes118.exe windows:4 windows x86 arch:x86
b4d1041390174704aa3d98e27a292e64
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
RtlUnwind
HeapSize
VirtualAlloc
CreateFiber
GetCommandLineA
VirtualProtect
ResumeThread
GetACP
HeapAlloc
IsProcessorFeaturePresent
UnhandledExceptionFilter
LoadLibraryA
ExitProcess
HeapDestroy
EnumResourceNamesA
TerminateProcess
GetProcAddress
IsDebuggerPresent
VirtualFree
GetLocaleInfoA
VirtualQuery
SetThreadPriority
InterlockedCompareExchange
SetUnhandledExceptionFilter
GetSystemInfo
HeapCreate
HeapReAlloc
WriteFile
setupapi
CMP_WaitNoPendingInstallEvents
SetupDiGetDeviceRegistryPropertyW
CM_Get_DevNode_Status
user32
SetFocus
wsprintfA
CharNextA
CallWindowProcA
GetClassInfoExA
IsWindow
OffsetRect
ShowWindow
GetClientRect
PtInRect
GetParent
EqualRect
SetWindowLongA
CreateWindowExA
DefWindowProcA
RegisterClassExA
LoadCursorA
GetFocus
UnregisterClassA
IntersectRect
GetWindowLongA
EndPaint
GetDC
ReleaseDC
UnionRect
SetWindowPos
InvalidateRect
BeginPaint
RealGetWindowClassA
IsChild
GetKeyState
SetWindowRgn
DestroyWindow
Sections
.text Size: 178KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ