Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4373196495fd5bd61a3ca0dd086b415d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4373196495fd5bd61a3ca0dd086b415d.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4373196495fd5bd61a3ca0dd086b415d
-
Size
344KB
-
MD5
4373196495fd5bd61a3ca0dd086b415d
-
SHA1
7e80f5e068643383fc29991333a23608ed322976
-
SHA256
ba531df27744b17a0006cda3da7751903ad9354cb5740c41a35913df05be0830
-
SHA512
8576c0301afa4780e1637ba40fddba2c20075122273d7c95831ff782d2359c842e8e41066b1202937baefeff833b1163da1b883255bb0d81c940d817dc8ad7a8
-
SSDEEP
6144:rlwEIOLQRCQ5Af7kkAsntTQubE1/K5blopzcbbw:rloDRCQMNAstTQajopf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_4373196495fd5bd61a3ca0dd086b415d
Files
-
JaffaCakes118_4373196495fd5bd61a3ca0dd086b415d.exe windows:5 windows x86 arch:x86
e6b67564c2257b78055001fda93547a9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowLongW
DialogBoxParamA
GetDesktopWindow
SetWindowTextA
GetActiveWindow
IsCharAlphaA
MoveWindow
EnumChildWindows
ole32
CoCreateFreeThreadedMarshaler
CoRevokeClassObject
comctl32
InitCommonControlsEx
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
kernel32
HeapFree
SizeofResource
GetDateFormatA
GetTimeZoneInformation
InitializeCriticalSection
FindResourceExA
SuspendThread
LoadResource
SetFileAttributesA
GetTickCount
GetStartupInfoA
GetProcAddress
FreeLibrary
LoadLibraryA
LocalFree
IsBadStringPtrA
HeapCreate
LocalAlloc
DeleteCriticalSection
Sections
.text Size: 335KB - Virtual size: 335KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ