Static task
static1
Behavioral task
behavioral1
Sample
304d54c68f196b3d237a9693c8a2ced0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
304d54c68f196b3d237a9693c8a2ced0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
304d54c68f196b3d237a9693c8a2ced0_JaffaCakes118
-
Size
58KB
-
MD5
304d54c68f196b3d237a9693c8a2ced0
-
SHA1
4bd4b391adac6d13a57f266b37eb11e3a83c87b7
-
SHA256
fabc87387863fb906e67764d1dd9bde2acd3a0a40a8a3e95fef3fa608aa6e488
-
SHA512
34dbd6f196890c1e7bb16a0febca233cd3866bd64fc3b13540e316f62ee7b0061a6e128c8df23a6f896fa809e0d03b7555379b0ef69caa6f5386201843b06289
-
SSDEEP
1536:JFFWjjfUvFg0Nr7AL6otokgYOZJdd9rc:Uf6xUztxfOZJdjc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 304d54c68f196b3d237a9693c8a2ced0_JaffaCakes118
Files
-
304d54c68f196b3d237a9693c8a2ced0_JaffaCakes118.exe windows:4 windows x86 arch:x86
d03f675c61510449d759b7d72715caa7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GlobalFree
GetEnvironmentVariableA
LoadLibraryExA
GetCurrentThreadId
GetExitCodeProcess
CreateMutexA
TlsAlloc
CloseHandle
GetStdHandle
ReleaseMutex
FindResourceA
DeleteAtom
GetProcessHeap
GlobalUnlock
GetModuleHandleA
SetLastError
HeapCreate
TlsGetValue
lstrlenW
user32
DispatchMessageA
SetFocus
DrawMenuBar
GetDlgItem
CreateMenu
GetDC
CallWindowProcA
IsWindow
FillRect
DrawEdge
CheckRadioButton
GetCaretPos
CreateWindowExA
rsaenh
CPDecrypt
CPGenKey
CPHashData
CPDeriveKey
CPSignHash
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 43KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE