Static task
static1
Behavioral task
behavioral1
Sample
144dae91bada6e6f0c251ed4def90de6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
144dae91bada6e6f0c251ed4def90de6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
144dae91bada6e6f0c251ed4def90de6_JaffaCakes118
-
Size
106KB
-
MD5
144dae91bada6e6f0c251ed4def90de6
-
SHA1
0bece77e64fdf2407dbbb66194a13a01fd25e848
-
SHA256
e2435d13fdd5119c8cf48c1f43f1e0435f275a08bdaf6a8ba966a79e15f696dc
-
SHA512
d977a2f414e54f81e8f88939b72e7d1fa0146381db3dc1992070224a3f6ba4da3a874934770b9ed6c6835c821fb8ad5087bb46a29511a2da222b480a081597c0
-
SSDEEP
1536:2j5L8km2Ira3iM72npJZexmRY7hVEFl5ngGfwRFqo00+CGprTNFoChf4:+epra3b72HZegRY7hVErWGfwOrPhFhA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 144dae91bada6e6f0c251ed4def90de6_JaffaCakes118
Files
-
144dae91bada6e6f0c251ed4def90de6_JaffaCakes118.exe windows:4 windows x86 arch:x86
07707ea45f6cffe8c6dc35aa2ff081ac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
LocalReAlloc
GetDateFormatA
GetFileType
GetVersionExA
ExitThread
CompareStringA
GetACP
GetStartupInfoA
GetFileSize
DeleteFileA
GetModuleFileNameA
CreateThread
FindResourceA
GetStdHandle
GetCurrentThreadId
GetSystemDefaultLangID
GetVersion
FindFirstFileA
HeapDestroy
SetThreadLocale
FreeLibrary
GetCurrentThread
InitializeCriticalSection
GetLocaleInfoA
SetLastError
GetCurrentProcess
VirtualQuery
DeleteCriticalSection
GetStringTypeW
MoveFileA
GetOEMCP
VirtualFree
GetTickCount
GetThreadLocale
HeapFree
WriteFile
FormatMessageA
LoadLibraryExA
WaitForSingleObject
CreateFileA
RaiseException
MoveFileExA
lstrlenA
FindClose
FreeResource
GetStringTypeA
VirtualAllocEx
GlobalAddAtomA
SetEndOfFile
LoadLibraryA
EnumCalendarInfoA
lstrcmpA
HeapAlloc
GetCPInfo
lstrcpyA
GetDiskFreeSpaceA
GetFullPathNameA
GetModuleHandleA
CreateEventA
GetUserDefaultLCID
lstrcatA
version
VerFindFileA
GetFileVersionInfoA
msvcrt
memcpy
memmove
log
user32
GetMessagePos
SystemParametersInfoA
FrameRect
GetMenuItemCount
GetMenuItemID
GetFocus
DrawIcon
GetWindowTextA
GetWindow
GetIconInfo
CharLowerBuffA
GetSysColor
DrawIconEx
GetClientRect
BeginPaint
EnableWindow
GetPropA
DrawFrameControl
CharLowerA
IsMenu
SetTimer
GetKeyState
GetCursorPos
FindWindowA
GetMenuItemInfoA
DefFrameProcA
SetWindowPos
IsChild
GetDC
GetScrollPos
CreateIcon
GetLastActivePopup
GetKeyNameTextA
CreateMenu
EndDeferWindowPos
IsWindowVisible
GetDCEx
GetForegroundWindow
EnableScrollBar
GetMenuStringA
GetMenuState
GetSubMenu
GetCapture
GetMenu
GetScrollInfo
EqualRect
GetParent
ShowScrollBar
GetClipboardData
CheckMenuItem
EnumChildWindows
FillRect
CreateWindowExA
GetSysColorBrush
CallWindowProcA
GetClassInfoA
RegisterClassA
SetWindowLongA
MessageBoxA
DeferWindowPos
EnumThreadWindows
Sections
CODE Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE