yV0FVh
Static task
static1
Behavioral task
behavioral1
Sample
14d0c84f00f8bad2f3ae4bad7f64b864_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
14d0c84f00f8bad2f3ae4bad7f64b864_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
14d0c84f00f8bad2f3ae4bad7f64b864_JaffaCakes118
-
Size
95KB
-
MD5
14d0c84f00f8bad2f3ae4bad7f64b864
-
SHA1
5672aafcb15486c979745420c2e8d42b7fb6c24f
-
SHA256
d28603d5c084501b50195969e17a1f4202a9c61a01757ac4e422de2bb4ef0634
-
SHA512
90ebccc62f6bc07499999d735c705924c26edabf8a02a8ef61e71e1ab2f12342b428dbee600289c26ac74a032882448a7410bdb94530fa156ad92ec5e7e57ce5
-
SSDEEP
1536:YwptYLfAKYi57nqNwDoC1p3a2pm5srag04It81Y47GdWyPz4mV:1pKc457foypDmGrzNBYVAyPsk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14d0c84f00f8bad2f3ae4bad7f64b864_JaffaCakes118
Files
-
14d0c84f00f8bad2f3ae4bad7f64b864_JaffaCakes118.exe windows:4 windows x86 arch:x86
7e588145af531950269187a13a428ab8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderLocation
SHGetDesktopFolder
gdi32
RestoreDC
GetBkMode
kernel32
LoadLibraryA
MoveFileA
lstrlenA
VirtualAllocEx
lstrcatA
GetACP
SetEvent
GlobalFindAtomA
SetErrorMode
SetFilePointer
SetThreadLocale
ReadFile
GetModuleHandleA
InitializeCriticalSection
lstrcmpA
HeapDestroy
IsBadHugeReadPtr
FreeResource
VirtualAlloc
DeleteFileA
LoadResource
lstrcmpiA
ExitProcess
RaiseException
user32
DispatchMessageW
IsWindowEnabled
IsZoomed
SetScrollRange
IsWindow
SetWindowTextA
OpenClipboard
SendMessageA
SystemParametersInfoA
InvalidateRect
EqualRect
GetScrollPos
GetMenuItemCount
RegisterClipboardFormatA
DrawIconEx
EnableWindow
SetActiveWindow
GetWindowTextLengthA
MsgWaitForMultipleObjects
GetWindowThreadProcessId
IntersectRect
DrawFrameControl
CharNextW
ShowScrollBar
InsertMenuA
CreateIcon
IsWindowUnicode
GetActiveWindow
SetClassLongA
UnhookWindowsHookEx
AdjustWindowRectEx
SetWindowPlacement
LoadStringA
DestroyCursor
GetCapture
GetKeyState
CharUpperA
IsCharUpperA
RegisterClassA
GetMenu
GetIconInfo
ScreenToClient
IsChild
LoadIconA
ShowOwnedPopups
ScrollWindow
GetScrollRange
TrackPopupMenu
BeginPaint
LoadBitmapA
PeekMessageW
MapVirtualKeyA
CharNextA
CallWindowProcA
GetMenuItemInfoA
GetKeyboardLayoutNameA
KillTimer
IsDialogMessageW
DefFrameProcA
InflateRect
SetCapture
FrameRect
ClientToScreen
MessageBoxA
Exports
Exports
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.badata Size: 512B - Virtual size: 462B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ