Static task
static1
Behavioral task
behavioral1
Sample
141849d9792dfcc33a9ab6b8edb7ff6f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
141849d9792dfcc33a9ab6b8edb7ff6f_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
141849d9792dfcc33a9ab6b8edb7ff6f_JaffaCakes118
-
Size
449KB
-
MD5
141849d9792dfcc33a9ab6b8edb7ff6f
-
SHA1
a41990ac943bc0b87b04eaad50bcc5239b070c8b
-
SHA256
fae56ed5e474d555818e0ce7de4daff2c63542168e9b0a08981ce280cfbe9c8b
-
SHA512
cba254508bbbadbd172375bdfcd87003580e492be8dd42aa5ba4feb5f3b1f024302d341899b0dcb9f1d9a13692bcd4a97efb9461e6869cc2fe6baf3119299f59
-
SSDEEP
12288:W0vOOfMND6PPOcGV75kE5qvqbX+xZqzFM:VvOOfMKi59qvGcqC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 141849d9792dfcc33a9ab6b8edb7ff6f_JaffaCakes118
Files
-
141849d9792dfcc33a9ab6b8edb7ff6f_JaffaCakes118.exe windows:4 windows x86 arch:x86
1cabd59e6f6080bf0b2d079e503b069a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexA
ReleaseMutex
OpenProcess
WriteConsoleA
HeapSize
GetStartupInfoA
DeleteFileW
GetCommandLineW
CreateFileA
GetModuleHandleA
SetConsoleCP
VirtualAllocEx
GetEnvironmentVariableW
GetFileAttributesA
SetEvent
SetLastError
ResetEvent
RemoveDirectoryA
ExitProcess
ClearCommBreak
GetTickCount
user32
GetDC
DispatchMessageW
FindWindowA
GetWindowLongA
GetCursorInfo
PeekMessageA
GetDC
GetDC
DispatchMessageW
GetClassInfoA
CallWindowProcW
GetSysColor
GetCaretPos
linkinfo
CreateLinkInfoA
CreateLinkInfoA
CreateLinkInfoA
CreateLinkInfoA
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 608KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 443KB - Virtual size: 442KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ