qVLc7dvo3Ta7@8
Static task
static1
Behavioral task
behavioral1
Sample
19515f0971ee90d20398e60df7983332_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
19515f0971ee90d20398e60df7983332_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
19515f0971ee90d20398e60df7983332_JaffaCakes118
-
Size
96KB
-
MD5
19515f0971ee90d20398e60df7983332
-
SHA1
2a779947ef87a1c09784d8856acc9e74871d5f3e
-
SHA256
ff2edcf5f74bd76c8f382008be0b6741222607d4fa6bcef750140e12a6de46d3
-
SHA512
9b64e1ba4c4e24d231c9ce2349fd6a48e7a994618f18d91d2a95ef9977fd10770520c8ffe21fbed7653dda94d71e62b49e85b374a8c22a293efbbef6eba0edfc
-
SSDEEP
1536:pMWriupHfiKukFylMt/lZz2gfyIbeOKa67JY0aTGgRkhi9NBp4my:FrFpHfiVkFy0/lZzpzwvwNBeP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19515f0971ee90d20398e60df7983332_JaffaCakes118
Files
-
19515f0971ee90d20398e60df7983332_JaffaCakes118.exe windows:4 windows x86 arch:x86
d6507b256d9b05eeb54e05d50b8fbeda
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetTextColor
GetPaletteEntries
ole32
CoReleaseMarshalData
MkParseDisplayName
StgOpenStorage
OleRegGetUserType
CoGetMalloc
kernel32
GetModuleHandleA
lstrlenW
EnterCriticalSection
GetCurrentProcessId
LoadLibraryA
GetCurrentProcess
LocalReAlloc
ExitProcess
GetTempPathA
IsBadHugeReadPtr
VirtualAlloc
GetTickCount
SetHandleCount
GetThreadLocale
SetErrorMode
GetStringTypeA
HeapAlloc
GetACP
GetSystemDefaultLangID
LockResource
FreeLibrary
GetVersionExA
lstrcmpiA
SetThreadLocale
user32
IsWindowVisible
CharUpperA
wsprintfA
DrawAnimatedRects
IsZoomed
GetCapture
ActivateKeyboardLayout
DrawTextA
MessageBoxA
RegisterClipboardFormatA
SetParent
GetMenu
GetMenuItemID
GetClientRect
GetKeyboardLayout
GetLastActivePopup
GetClipboardData
GetWindowTextA
GetMenuItemCount
GetKeyboardLayoutList
OemToCharA
IsWindowUnicode
SetPropA
DrawMenuBar
GetForegroundWindow
OpenClipboard
CreateMenu
SetWindowsHookExA
InflateRect
LoadBitmapA
ClientToScreen
SystemParametersInfoA
LoadCursorA
IsRectEmpty
EndDialog
LoadStringA
TrackPopupMenu
EmptyClipboard
IsMenu
SetWindowTextA
RedrawWindow
UnhookWindowsHookEx
GetScrollPos
GetClassLongA
DeleteMenu
GetWindowThreadProcessId
IntersectRect
ScrollWindow
GetClassNameA
SendMessageW
ReleaseCapture
InsertMenuA
CharLowerBuffA
DestroyIcon
DestroyMenu
GetFocus
GetDlgItem
SetWindowPos
EndPaint
GetIconInfo
EnumThreadWindows
CreatePopupMenu
Exports
Exports
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.badata Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ