Static task
static1
Behavioral task
behavioral1
Sample
0f5cb172f3ece4aa91f580e375c08434_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0f5cb172f3ece4aa91f580e375c08434_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0f5cb172f3ece4aa91f580e375c08434_JaffaCakes118
-
Size
224KB
-
MD5
0f5cb172f3ece4aa91f580e375c08434
-
SHA1
9a8a3f2cace90364c51cf6421bc5d3289c83d900
-
SHA256
d0a9b37223e78be05a392a20fa57925f2f1c25340a203cdeffed2226a9bda103
-
SHA512
fa4d46b3f72f20ce1aa34f3e9665193e7cfd320e5fa7e56d177154b66ed46ab35d93557856f531067e84be448d3d0ec16b6d1956ed32365901a29c0ae7040abd
-
SSDEEP
6144:AoKPQdwom/r3E4inWry/n4pUMYbJSraBGsZ:AoKPQdi/r0XWYnOYbJaaBGu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f5cb172f3ece4aa91f580e375c08434_JaffaCakes118
Files
-
0f5cb172f3ece4aa91f580e375c08434_JaffaCakes118.exe windows:4 windows x86 arch:x86
44cd0c0a87c493ce8de1aecb7215fd72
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadReadPtr
CloseHandle
LoadLibraryExW
VirtualProtectEx
CreateMutexA
FindClose
IsDebuggerPresent
GetConsoleTitleA
lstrlenA
GlobalUnlock
EnumResourceTypesW
FreeConsole
LocalFree
CancelIo
GetStdHandle
CreateEventA
GetSystemTime
GetModuleHandleA
GlobalLock
GetLastError
user32
GetDlgItemTextA
GetKeyState
GetMessageA
LoadCursorA
IsMenu
EnumWindows
GetParent
DialogBoxParamA
IsIconic
GetMessageA
GetSubMenu
CreateWindowExA
EndDialog
MessageBoxA
clbcatq
GetCatalogObject
GetComputerObject
SetSetupOpen
CheckMemoryGates
ComPlusMigrate
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ