Static task
static1
Behavioral task
behavioral1
Sample
414d06a8dca67540149d09179683c4f8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
414d06a8dca67540149d09179683c4f8_JaffaCakes118
-
Size
516KB
-
MD5
414d06a8dca67540149d09179683c4f8
-
SHA1
0782d21a8f45b1e5ba2d981db5b3e5cff23822c4
-
SHA256
43694a890d49248ef9336363dad7c2eb1ff1acba24a8f25cb4cc4181213a0495
-
SHA512
d1b9b13ed10e1d26333a75949a0dab298f5df5cda533344e0f91dcb3246bdca687d5ebae25380a620704d94877db2385eb1274c670d3460f72f115859fd867a8
-
SSDEEP
12288:tfhpwRVXqP5EKso+DVce8vu+HVY1LrStUkPdESN:tkRdqP5E8YVRkVorDeN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 414d06a8dca67540149d09179683c4f8_JaffaCakes118
Files
-
414d06a8dca67540149d09179683c4f8_JaffaCakes118.exe windows:4 windows x86 arch:x86
94400fe3e62cd2376124312fe435b8e4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
UpdateWindow
TranslateMessage
ShowWindow
SendMessageA
RegisterClassExA
PostQuitMessage
MessageBoxA
LoadIconA
LoadCursorA
GetMessageA
DispatchMessageA
DefWindowProcA
CreateWindowExA
kernel32
GetModuleHandleA
HeapAlloc
lstrlenA
lstrcpynA
lstrcpyA
lstrcatA
WriteFile
SizeofResource
SetFileAttributesA
RtlMoveMemory
LockResource
LoadResource
LoadLibraryA
CloseHandle
CreateFileA
ExitProcess
FindResourceA
FreeResource
GetCommandLineA
GetEnvironmentVariableA
GetFileSize
GetModuleFileNameA
GlobalFree
GetProcAddress
GetProcessHeap
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
GlobalAlloc
HeapFree
shlwapi
PathFindFileNameA
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 508KB - Virtual size: 508KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE