Static task
static1
Behavioral task
behavioral1
Sample
04ce4c3f30202aa0207d46a77a899ec0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04ce4c3f30202aa0207d46a77a899ec0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
04ce4c3f30202aa0207d46a77a899ec0_JaffaCakes118
-
Size
36KB
-
MD5
04ce4c3f30202aa0207d46a77a899ec0
-
SHA1
2974bbe9ac9f52b9c518dee91a687d698db12d3d
-
SHA256
e876186c78aa1994347e0eeaf6f85f0639f4279ac602d02f19dc40753553e94f
-
SHA512
f888fda59af08d838e245c720b6153057ed49359d44d24010ab33def4799634c19572afba0f53796e374c9e8ed9c0fcdaf349d0d409c17fc7e737c6805cfe53e
-
SSDEEP
384:KD2lXW4XWELsJLtlwAovrj7M47HvbwCh83tdK4z6oYw9L3aQlQupvB7Og7+RKqTe:q47s9ItHgVdK4zhX9lOupvBOg7CbTmF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04ce4c3f30202aa0207d46a77a899ec0_JaffaCakes118
Files
-
04ce4c3f30202aa0207d46a77a899ec0_JaffaCakes118.exe windows:4 windows x86 arch:x86
df0e79d97f00107506f8943f65032731
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EndDialog
SendMessageA
DestroyWindow
DialogBoxParamA
DefWindowProcA
BeginPaint
GetClientRect
DrawTextA
EndPaint
PostQuitMessage
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
GetMessageA
TranslateMessage
DispatchMessageA
kernel32
GetStartupInfoA
GetModuleHandleA
GetCurrentDirectoryA
GetLastError
LoadLibraryA
msvcrt
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
__getmainargs
__p__acmdln
exit
_XcptFilter
_exit
fgetc
fflush
fputc
_controlfp
_initterm
memset
wcsncmp
wcslen
memcpy
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ