Static task
static1
Behavioral task
behavioral1
Sample
fd5cadf50698e9d0f3fc89f602284c99_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fd5cadf50698e9d0f3fc89f602284c99_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fd5cadf50698e9d0f3fc89f602284c99_JaffaCakes118
-
Size
108KB
-
MD5
fd5cadf50698e9d0f3fc89f602284c99
-
SHA1
809e91ae6152a013c5dc47e418d37e4ccbd79fc8
-
SHA256
e3fb4a45a97f3005b72d4ce5a4d084d9b1bab650ac21cc140196e797e7cd1faa
-
SHA512
cb7d078eabe647174add3dc371619d71ce0782f8c3033163cff8d022313924888f64aff0b77cb641d9b4d3c418007b3e844be0f4d919cef64e7b21c2fd1f67dd
-
SSDEEP
1536:e8iFkRPeG0bSMhC4UT5YMvsnn1Awre3m57PlBIhMFIJVRJspRi5um3i6udpY1POu:e74ChnawnKwWmh7dkVRES1POKz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fd5cadf50698e9d0f3fc89f602284c99_JaffaCakes118
Files
-
fd5cadf50698e9d0f3fc89f602284c99_JaffaCakes118.exe windows:5 windows x86 arch:x86
6ee6a2b4fb86d41b3b46cf4a7335e6c9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetParent
CharNextA
GetDC
GetDesktopWindow
TranslateMessage
GetSystemMetrics
gdi32
SelectObject
SetStretchBltMode
RectVisible
LineTo
RestoreDC
GetObjectA
CreateFontIndirectA
SetMapMode
CreateCompatibleDC
CreateSolidBrush
GetPixel
GetTextMetricsA
GetDeviceCaps
DeleteDC
GetClipBox
CreatePalette
GetStockObject
SelectPalette
SetTextColor
SetTextAlign
kernel32
GlobalFindAtomA
GetWindowsDirectoryA
GetSystemTime
GetCommandLineA
GetModuleHandleA
RemoveDirectoryW
DeleteFileA
lstrcmpiA
FindClose
lstrcmpA
lstrlenA
RemoveDirectoryA
lstrlenW
lstrcmpiW
VirtualAlloc
QueryPerformanceCounter
VirtualFree
CopyFileA
glu32
gluNurbsCallback
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ