Static task
static1
Behavioral task
behavioral1
Sample
311d4ab48722c82819754ef51f2e8298_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
311d4ab48722c82819754ef51f2e8298_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
311d4ab48722c82819754ef51f2e8298_JaffaCakes118
-
Size
556KB
-
MD5
311d4ab48722c82819754ef51f2e8298
-
SHA1
5a8e018f9fdb529fda1c6daf9fc96fb1fb8b7817
-
SHA256
32282f11616a649552f85f86b7eb02ad81e181360494d23836365538c7c742a7
-
SHA512
0279c392c56475383a4d010e368d8968c1c90f5993211d14b0939adedb38adfec57b919354f1893e7295e42462d098919bab8057735b88b148b1ab6d5726d49e
-
SSDEEP
12288:/pyLPH9GRLumTsa7QuksXwy8XeHLxor+R:ByZGtTsmKsA1vq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 311d4ab48722c82819754ef51f2e8298_JaffaCakes118
Files
-
311d4ab48722c82819754ef51f2e8298_JaffaCakes118.exe windows:4 windows x86 arch:x86
7498d0edcb9ae95fb62625c7e9c113bd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
ShowWindow
DialogBoxParamA
SetWindowRgn
SetWindowPos
SetWindowLongA
SetLayeredWindowAttributes
SetFocus
SetDlgItemTextA
SendMessageA
SendDlgItemMessageA
MessageBoxA
LoadIconA
LoadBitmapA
GetWindowLongA
GetDlgItemTextA
GetDlgItem
EndDialog
kernel32
LocalAlloc
CreateFileA
CloseHandle
LocalFree
ReadFile
CreateThread
FreeResource
SizeofResource
lstrlenA
lstrcatA
Sleep
RtlZeroMemory
LockResource
ExitProcess
FindResourceA
GetModuleHandleA
GetTickCount
LoadResource
SetFilePointer
gdi32
CreatePatternBrush
ExtCreateRegion
DeleteObject
winmm
waveOutGetPosition
waveOutOpen
waveOutPrepareHeader
waveOutReset
waveOutUnprepareHeader
waveOutWrite
waveOutClose
Sections
0 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
21k0rh87 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
6 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
i5jbjgtf Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
lkggzwus Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
9b45a77u Size: 204KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
n.ahxzrt Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ