Static task
static1
Behavioral task
behavioral1
Sample
039802449c72b4e620d0c1274b514251_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
039802449c72b4e620d0c1274b514251_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
039802449c72b4e620d0c1274b514251_JaffaCakes118
-
Size
21KB
-
MD5
039802449c72b4e620d0c1274b514251
-
SHA1
dab9986dc475ba0ef71b5ae4b51b7174bb63cba8
-
SHA256
282a1528ba328ed143278b8b7fec41fb6560c7295b663a60b5c67a27cd263ba4
-
SHA512
0c15dd7f2ad0974dfaee167785d5a85940d2cf699c438e02b3a6f918d0352ae75b2e6c89e2ddf3d7e3e42ead812c5098b29158820c185a46e561e9a42ea9c95b
-
SSDEEP
384:tUOa0dKUYoTm0HtdDgRcFQXEfppgiJkLCFY6ZADlYeDgdlL74:tUalLC4LCwpGie5YADZDELk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 039802449c72b4e620d0c1274b514251_JaffaCakes118
Files
-
039802449c72b4e620d0c1274b514251_JaffaCakes118.exe windows:4 windows x86 arch:x86
305bbfdc67d2d61054f7484d613e4e5b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetComputerNameA
GetDateFormatA
GetDiskFreeSpaceExW
GetFileInformationByHandle
GetLogicalDrives
GetNumberFormatW
GetPrivateProfileSectionNamesA
GetProcessHeaps
GetSystemTimeAdjustment
GetTempPathW
GetTimeFormatW
GetVersionExW
GlobalAddAtomW
GlobalFindAtomA
IsProcessorFeaturePresent
LCMapStringA
LCMapStringW
LocalShrink
MoveFileW
ReleaseSemaphore
RtlFillMemory
RtlZeroMemory
SetEnvironmentVariableA
SetFileTime
WriteFileGather
user32
AttachThreadInput
CascadeChildWindows
CharPrevExA
CharUpperBuffW
CountClipboardFormats
CreateWindowStationW
DdeCreateStringHandleW
DdeImpersonateClient
DefFrameProcA
GetCaretBlinkTime
GetMenuItemCount
GetMenuItemRect
HiliteMenuItem
IsWindowEnabled
LoadCursorFromFileA
LoadKeyboardLayoutW
MenuItemFromPoint
MessageBoxIndirectW
PtInRect
RedrawWindow
SetDlgItemTextA
SetDoubleClickTime
SetProcessWindowStation
SetRectEmpty
SetUserObjectSecurity
SetWindowsHookExW
SetWindowsHookW
SwapMouseButton
TranslateAcceleratorW
WaitMessage
gdi32
CloseFigure
CopyEnhMetaFileA
CreateCompatibleBitmap
CreateDCA
CreateDIBSection
CreatePatternBrush
EndDoc
EnumMetaFile
ExtCreatePen
ExtFloodFill
GetCharWidth32A
GetGraphicsMode
GetNearestPaletteIndex
GetRgnBox
GetTextFaceW
MoveToEx
PolyTextOutA
PtVisible
ResetDCW
ScaleViewportExtEx
SetBoundsRect
SetColorSpace
SetMetaFileBitsEx
SetStretchBltMode
SetSystemPaletteUse
UnrealizeObject
Sections
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE