Static task
static1
Behavioral task
behavioral1
Sample
4368e0dc2ace24dd8d928fa60aa040d1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4368e0dc2ace24dd8d928fa60aa040d1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
4368e0dc2ace24dd8d928fa60aa040d1_JaffaCakes118
-
Size
773KB
-
MD5
4368e0dc2ace24dd8d928fa60aa040d1
-
SHA1
c8d653f609d9c4ca8ef4cd29119c6ac40ee3dae5
-
SHA256
9f4cfae36ad6d9ac06db0c60f895f55a4fd8bc1b43197014bd18c7e8b18e99c3
-
SHA512
3256f5af331912cb8954756e430825bdd602f7ee03539dec06fa9e7f765ff9a5fb368beaa13c74d3052827985b5d05c2d30910c1e80044d024ff12165ed71d9b
-
SSDEEP
12288:C1/RksPUlRlqlQz59bmDH+0saQVWWTmA182zgcv5ItwDrD/RxeGBpdLRqQCv9:zrlq6bulKVhTm8Fzgcz3DnZ3Le
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4368e0dc2ace24dd8d928fa60aa040d1_JaffaCakes118
Files
-
4368e0dc2ace24dd8d928fa60aa040d1_JaffaCakes118.exe windows:4 windows x86 arch:x86
48941ddeeba3f6ae9cf51d1861a4b861
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQueryEx
ResumeThread
lstrlenW
GetCommandLineA
GetModuleHandleA
CreateEventA
SetEvent
Sleep
HeapDestroy
FindResourceA
HeapCreate
GetTimeFormatA
DeleteFileW
CloseHandle
GetCommandLineA
ResetEvent
CloseHandle
GetStartupInfoA
OpenMutexW
GetModuleFileNameW
user32
FindWindowA
DispatchMessageA
GetSysColor
GetWindowLongA
IsWindow
DestroyMenu
DispatchMessageA
IsZoomed
CallWindowProcW
DrawTextW
PeekMessageA
GetClassInfoA
CreateIcon
ntlanman
NPOpenEnum
NPOpenEnum
NPOpenEnum
NPOpenEnum
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 763KB - Virtual size: 763KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ