Static task
static1
Behavioral task
behavioral1
Sample
14b5a5a7566a5de88d49c2976ad9aae5_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
14b5a5a7566a5de88d49c2976ad9aae5_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
14b5a5a7566a5de88d49c2976ad9aae5_JaffaCakes118
-
Size
112KB
-
MD5
14b5a5a7566a5de88d49c2976ad9aae5
-
SHA1
723724773e8bc8d09370e3c0f88be6b34cfc9dc3
-
SHA256
95553eedeb94181359fe1f51b60235d32c9a511865d66b3f1af2d39c8ea00d5e
-
SHA512
bfa14bed8309c42435152d00c4c615984ab418e8239157023d0ffa362a383f183045c51e9aeff5a5ba26075a17a317882425b4d0b40b419e2b9ee203dfd2d00e
-
SSDEEP
1536:vyIara6Z/t0Z5+veRONfw6Db0iO1FYy6uOeVnnl3i6mRGdxzyF73:v6ra6Z10AeRrC81FYgO4nnDpyFb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14b5a5a7566a5de88d49c2976ad9aae5_JaffaCakes118
Files
-
14b5a5a7566a5de88d49c2976ad9aae5_JaffaCakes118.exe windows:5 windows x86 arch:x86
d706cce95121695a7773cbe0a05d5b4c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetMapMode
CreateFontIndirectA
SetStretchBltMode
DeleteDC
GetDeviceCaps
GetClipBox
CreateSolidBrush
GetTextMetricsA
CreateCompatibleDC
SetTextColor
RestoreDC
LineTo
RectVisible
GetStockObject
SetTextAlign
GetObjectA
SaveDC
DeleteObject
SelectObject
SelectPalette
CreatePalette
GetPixel
user32
GetSystemMetrics
TranslateMessage
GetDC
GetParent
CharNextA
GetDesktopWindow
kernel32
CopyFileA
lstrcmpA
GetSystemTime
GetWindowsDirectoryA
lstrcmpiA
QueryPerformanceCounter
lstrlenA
lstrlenW
GetModuleHandleA
RemoveDirectoryW
FindClose
GlobalFindAtomA
GetCommandLineA
lstrcmpiW
RemoveDirectoryA
DeleteFileA
VirtualAlloc
VirtualFree
glu32
gluNurbsCallback
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ