Static task
static1
Behavioral task
behavioral1
Sample
1015bf001907db906abc771a087b5e8e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1015bf001907db906abc771a087b5e8e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1015bf001907db906abc771a087b5e8e_JaffaCakes118
-
Size
185KB
-
MD5
1015bf001907db906abc771a087b5e8e
-
SHA1
c81f4c997ab2e34300ace8387166337bcf570e7a
-
SHA256
9e7822c10ac8b952fb5b1e4d4f372318dcf4604930faf018865ca6610fe112cf
-
SHA512
2c45ec3dd8a7c1e9c9c6152613e9649da7b620e74748a5a049249bbd3e829c6a97209ad92742fca6192ddd600d7246ecdb2d558a5b0e321b6f04febcb7329d56
-
SSDEEP
3072:xOqHvRlxO4HJ+epgJ21vyZiI47rAF2UKZhVqTk:1RJ+epSPZiI4B0k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1015bf001907db906abc771a087b5e8e_JaffaCakes118
Files
-
1015bf001907db906abc771a087b5e8e_JaffaCakes118.exe windows:1 windows x86 arch:x86
377379abaf3a96820c3382fb4ada1da8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyA
RegCloseKey
comdlg32
FindTextA
GetSaveFileNameA
GetOpenFileNameA
comctl32
CreateToolbarEx
CreatePropertySheetPageA
user32
CreatePopupMenu
IsWindowVisible
GetSystemMetrics
msvcrt
__getmainargs
__p__fmode
_XcptFilter
__set_app_type
__p__commode
exit
_ismbbpunct
_except_handler3
_acmdln
memcpy
__setusermatherr
_wstrtime
_initterm
_controlfp
_exit
_adjust_fdiv
version
VerQueryValueA
shell32
SHBrowseForFolderA
kernel32
FlushFileBuffers
GetStartupInfoA
GetCurrentDirectoryA
GetModuleHandleA
HeapAlloc
HeapCreate
gdi32
EndDoc
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 173KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ