Static task
static1
Behavioral task
behavioral1
Sample
14c86e56b3bfc94fa1c3bad24c7ed576_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
14c86e56b3bfc94fa1c3bad24c7ed576_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
14c86e56b3bfc94fa1c3bad24c7ed576_JaffaCakes118
-
Size
55KB
-
MD5
14c86e56b3bfc94fa1c3bad24c7ed576
-
SHA1
d1139ebc1635cdf1bf179195ea34b5c35de2b513
-
SHA256
da07b428b7405b9a3261f3032f79df978bc40dad7ca90a689d388ad771c68a72
-
SHA512
df61f640317093a15145d184f2b0408666ff69d3d0d8e0e721147c5e1e3feec021f2d05481ce368efdf52c11be223b5dd5c94316aa595910ae524fe91277ea77
-
SSDEEP
768:027PNGi8Ll+aUHRq+bChG2RgV81PLB/aU3cB55eYNXalAWAk05Pixe8:06NGik+aUxRbChG2f1IUMfAlujC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14c86e56b3bfc94fa1c3bad24c7ed576_JaffaCakes118
Files
-
14c86e56b3bfc94fa1c3bad24c7ed576_JaffaCakes118.exe windows:2 windows x86 arch:x86
6c02987174515497a09020c09ca17e30
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDiskFreeSpaceA
ExitProcess
DosDateTimeToFileTime
lstrcmpA
GetCurrentThreadId
GetCommandLineA
GetStartupInfoW
GetCommandLineW
SetCurrentDirectoryW
GetModuleHandleA
CreateDirectoryA
GetCurrentProcessId
Beep
user32
SendDlgItemMessageW
GetDlgItem
SetTimer
GetClientRect
DestroyIcon
SetWindowRgn
SendDlgItemMessageA
GetWindowLongA
InsertMenuItemA
CopyImage
EndDialog
FindWindowW
DialogBoxParamA
DefWindowProcW
GetWindowDC
InsertMenuA
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 827B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ