Static task
static1
Behavioral task
behavioral1
Sample
aa8317d602a537b51fc7f52e50096c99_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
aa8317d602a537b51fc7f52e50096c99_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
aa8317d602a537b51fc7f52e50096c99_JaffaCakes118
-
Size
176KB
-
MD5
aa8317d602a537b51fc7f52e50096c99
-
SHA1
34b4cc05d557698051ccfc2612094e594dc6e063
-
SHA256
eb802a697c419662c692e04b3a2ecf3625063fea74e3b93795c5d53877f43bca
-
SHA512
bf05b028ceb8946f1f14d02be76c942a19099e4dbab3da1f99f181deb3c89f8995ddb7115f85ace288d087f4b4261cfd0d143fff970420bdfa7091baa6c02095
-
SSDEEP
3072:kR3DC61q4xS9x4qoxpl//GnAng/6CLfgoaquSqv:83W69yOFsCy6C8oaqje
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aa8317d602a537b51fc7f52e50096c99_JaffaCakes118
Files
-
aa8317d602a537b51fc7f52e50096c99_JaffaCakes118.exe windows:4 windows x86 arch:x86
b76d824df2f831857854633436dd260e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42u
ord5286
ord3793
ord4831
ord4435
ord2640
ord2047
ord6372
ord3744
ord5059
ord1720
ord5257
ord2438
ord2116
ord5273
ord2977
ord3142
ord3254
ord4459
ord3131
ord3257
ord2980
ord3076
ord2971
ord3397
ord3825
ord3826
ord3820
ord3074
ord4075
ord4621
ord4418
ord3569
ord609
ord1634
ord1143
ord567
ord825
ord4270
ord4279
ord640
ord800
ord2442
ord6168
ord3871
ord540
ord5871
ord1633
ord323
ord2371
ord2859
ord2854
ord3084
ord3566
ord3658
ord3621
ord2406
ord823
ord6589
ord6642
ord6583
ord6798
ord6848
ord6814
ord6846
ord6823
ord6850
ord6858
ord6838
ord6805
ord6830
ord6837
ord6849
ord6807
ord6806
ord6803
ord6836
ord6847
ord4347
ord4583
ord4582
ord4893
ord4364
ord4886
ord6808
ord5070
ord4334
ord4341
ord4714
ord4883
ord4525
ord4539
ord4537
ord4520
ord4523
ord4518
ord4957
ord4954
ord4103
ord6050
ord4401
ord5277
ord3743
ord1718
ord5256
ord6606
ord6683
ord4426
ord6475
ord6510
ord6791
ord6451
ord4667
ord4269
ord6371
ord4480
ord2546
ord2504
ord5727
ord3917
ord1089
ord5193
ord2388
ord3341
ord5296
ord5298
ord2717
ord4074
ord4692
ord5303
ord5285
ord5710
ord4616
ord3733
ord561
ord815
ord641
ord2506
ord2613
ord5261
ord4370
ord4847
ord4992
ord6048
ord1767
ord5276
ord4419
ord3592
ord1165
ord324
ord2294
ord4229
ord6193
ord4704
ord5781
ord6211
ord6370
ord5157
ord2377
ord5237
ord4390
ord1768
ord4073
ord6051
ord6826
ord2567
ord1569
msvcrt
__set_app_type
_except_handler3
?terminate@@YAXXZ
__dllonexit
_onexit
_controlfp
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
__CxxFrameHandler
_exit
_XcptFilter
exit
_wcmdln
__p__fmode
kernel32
GetStartupInfoW
GetModuleHandleW
CreateFileW
GetModuleFileNameW
user32
GetDC
EnableWindow
LoadIconW
GetWindowRect
InvalidateRect
GetDesktopWindow
SendMessageW
SetCapture
ReleaseCapture
CopyRect
GetClientRect
LoadBitmapW
SetForegroundWindow
ReleaseDC
PtInRect
gdi32
StretchBlt
CreateCompatibleDC
SelectObject
GetObjectW
shell32
Shell_NotifyIconW
Sections
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ