Static task
static1
Behavioral task
behavioral1
Sample
2190d06a0a14bfc4aba50fbc1e9e2419_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2190d06a0a14bfc4aba50fbc1e9e2419_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2190d06a0a14bfc4aba50fbc1e9e2419_JaffaCakes118
-
Size
166KB
-
MD5
2190d06a0a14bfc4aba50fbc1e9e2419
-
SHA1
9962aea96ac83a8115f4e102ef5f9eb41ce73bc6
-
SHA256
c734088fa22cc3390a510a4921924c5b437ca69497da14d71f0c222edbf26e23
-
SHA512
791a7587f65d8bafcceb81a500bfd4995a707b24fc88efbd47a4cbfca011d54ff814464636d1c6ebc3fde1448d330bd078b082c81a878f3d66686b3912382ac7
-
SSDEEP
3072:6wd3hsEDZWYB/Mr0s6PJx5MQNcHYQy9XBLp39sII+:0pYsuMv4QeXBnn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2190d06a0a14bfc4aba50fbc1e9e2419_JaffaCakes118
Files
-
2190d06a0a14bfc4aba50fbc1e9e2419_JaffaCakes118.exe windows:4 windows x86 arch:x86
7a11f814017d66417af1d2711bf91a47
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetACP
DeleteFileA
GetCommandLineW
GetVersion
lstrcmpiA
GetModuleHandleA
GetTickCount
GetCurrentThreadId
lstrcmpA
SetCurrentDirectoryA
GetThreadLocale
GetModuleHandleW
lstrcmpiW
GetStartupInfoA
GetWindowsDirectoryA
DeleteFileW
GetCurrentThread
RemoveDirectoryA
QueryPerformanceCounter
GetDriveTypeA
MulDiv
GlobalFindAtomW
IsDebuggerPresent
GetUserDefaultLangID
GetCommandLineA
GetCurrentProcessId
GlobalFindAtomA
lstrlenW
lstrlenA
CopyFileA
GetCurrentProcess
GetOEMCP
VirtualAlloc
GetConsoleOutputCP
VirtualFree
user32
GetDesktopWindow
GetParent
TranslateMessage
CharNextA
GetDC
GetSystemMetrics
gdi32
SetStretchBltMode
CreateSolidBrush
CreateCompatibleDC
GetPixel
LineTo
GetClipBox
GetStockObject
RestoreDC
PatBlt
SetTextColor
DeleteDC
DeleteObject
GetDeviceCaps
CreatePalette
GetObjectA
SelectObject
SetMapMode
SetTextAlign
RectVisible
SelectPalette
GetTextMetricsA
SaveDC
CreateFontIndirectA
glu32
gluNurbsCallback
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Oqyjmtvc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Tbtbugbu Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ