Static task
static1
Behavioral task
behavioral1
Sample
42caea6e8512230b55785fe7e875805d_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
42caea6e8512230b55785fe7e875805d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
42caea6e8512230b55785fe7e875805d_JaffaCakes118
-
Size
52KB
-
MD5
42caea6e8512230b55785fe7e875805d
-
SHA1
113b0991b6988f0927bf5f4a860030c8b2e03618
-
SHA256
ea88c4ff94f3c35885129dc0b8533ad4d2a7a8ba21e21f0a6de4553984a58403
-
SHA512
fd994e66256c3e20e6689c21c36dd3781255ddd88e6536986e8ac8c885744a8ca1e0a4ac732d369a80900c8ad48fd354e44ce9497717d3ccb470c2eb6aa08cbd
-
SSDEEP
768:VzNl3e/TSdGpWzDeKdVWPXfL/tdjDhiT8QCh3ke6ktqEg4nnRl80edGa2jTYSA+7:VvO0G+dVWP5djIT8Q+3Rnj8Z2jkEkm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42caea6e8512230b55785fe7e875805d_JaffaCakes118
Files
-
42caea6e8512230b55785fe7e875805d_JaffaCakes118.exe windows:4 windows x86 arch:x86
723078811eca1012b815c22585cabe87
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
SetFilePointer
GetCurrentDirectoryA
SetEvent
GetStdHandle
GetFileSize
GetComputerNameA
SuspendThread
VirtualAlloc
GetCurrentProcessId
ExitProcess
ResetEvent
CreateEventA
GetCurrentThreadId
LocalAlloc
ReleaseMutex
GetWindowsDirectoryA
GetModuleHandleA
GetVersionExA
ExitThread
advapi32
GetUserNameA
user32
GetWindow
FindWindowA
PostMessageA
RegisterClassA
SendMessageA
ShowWindow
CreateDialogParamA
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ