Static task
static1
Behavioral task
behavioral1
Sample
1afc750f01258ac6ccccc521297c6429_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1afc750f01258ac6ccccc521297c6429_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1afc750f01258ac6ccccc521297c6429_JaffaCakes118
-
Size
149KB
-
MD5
1afc750f01258ac6ccccc521297c6429
-
SHA1
ec411877467fa7dec29bdbf4fcd8062b64d0d7c6
-
SHA256
60f1ed93608e51dce55d68a971bf9a1ce48c5c64cb003fc14f70c1c788d9078e
-
SHA512
3773f83e5027761d319b97b0675c4f9df5f22b541dab18dd9c2c2e80d1d414960d37ed1905f736becfcb13904135b4783c5b187f9232e71bb387db4af154461b
-
SSDEEP
3072:JX7PGU9EtKtsIdekGxd1OUpp/xEtvf0le:FjGcS2sI8kGxd1OUphS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1afc750f01258ac6ccccc521297c6429_JaffaCakes118
Files
-
1afc750f01258ac6ccccc521297c6429_JaffaCakes118.exe windows:5 windows x86 arch:x86
bacb059cd4d098d6af9445e6f6f120e0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SelectPalette
DeleteDC
SelectObject
MoveToEx
CreatePen
SetStretchBltMode
SaveDC
SetWindowExtEx
GetTextMetricsA
CreateSolidBrush
kernel32
VirtualAlloc
lstrcmpiA
GetWindowsDirectoryA
GetCurrentProcess
VirtualFree
IsDebuggerPresent
SetLastError
SetCurrentDirectoryA
lstrlenW
user32
GetSystemMetrics
GetDC
TranslateMessage
GetDesktopWindow
GetParent
CharNextA
glu32
gluTessCallback
comctl32
InitCommonControls
Sections
.text Size: 1024B - Virtual size: 893B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Sqybh Pm Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ