Static task
static1
Behavioral task
behavioral1
Sample
018a2eed2e1a5907e9c61f81053bd31d_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
018a2eed2e1a5907e9c61f81053bd31d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
018a2eed2e1a5907e9c61f81053bd31d_JaffaCakes118
-
Size
150KB
-
MD5
018a2eed2e1a5907e9c61f81053bd31d
-
SHA1
8721f4986263201a8c0754073c52771d03bd4318
-
SHA256
1591694f56d488576c4355be57063ea9b6f78d5fd912cf390ddbecb5dad1f6e3
-
SHA512
3cb3b06af1daaa9df0cef6ea55961e39ac32a8dc1e50a3c6de5455d0d3fbca1381331b42f40e5161f3b19bdbac235a60b6bc67c910799f1073db81298c04d673
-
SSDEEP
1536:jrBri1Pm40kIOq8SxM3kGEUm6LyAEAODHuI42/gjhxmQY9bVJgplW9fi3fALOTFq:jlsPobXx+kR6wdTgnqYj4OBLret74
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 018a2eed2e1a5907e9c61f81053bd31d_JaffaCakes118
Files
-
018a2eed2e1a5907e9c61f81053bd31d_JaffaCakes118.exe windows:4 windows x86 arch:x86
88cb56364aa549b4ab11a6e6a28c0f51
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetClipBox
GetDeviceCaps
SetStretchBltMode
CreateSolidBrush
SetTextAlign
DeleteDC
MoveToEx
SetWindowExtEx
GetPixel
kernel32
DeleteFileW
GetUserDefaultLangID
lstrcmpA
VirtualAlloc
RemoveDirectoryA
GetDriveTypeA
lstrlenW
DeleteFileA
VirtualFree
user32
GetSystemMetrics
GetDC
GetParent
CharNextA
TranslateMessage
ShowWindow
glu32
gluTessCallback
comctl32
InitCommonControls
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Yqtcv Ff Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ