Static task
static1
Behavioral task
behavioral1
Sample
37fa96d6acb2b6e8e3329012043b4f98_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
37fa96d6acb2b6e8e3329012043b4f98_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
37fa96d6acb2b6e8e3329012043b4f98_JaffaCakes118
-
Size
143KB
-
MD5
37fa96d6acb2b6e8e3329012043b4f98
-
SHA1
07aa15bfb133c753f5113f8e9df7b56988a5476a
-
SHA256
969a028900510b17ee16eaac24ca58f914b150e494b32e6a38421f3f3f665e7b
-
SHA512
82eb8ba2bed5d647aef840711eb5bd14334d643326d7cf930e8673c1ca1ec8b7faf8ceca902b997ef959ceffac7f0a5eb2b5b2a91eb6b86b22478bacdedd1256
-
SSDEEP
3072:n5jz/aS9Hh0uTJKIkcJL/gD5z0XHYDZzNChYKFVaarSQLibDB:ntHzNicF/o5z0XHdJrrveb9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 37fa96d6acb2b6e8e3329012043b4f98_JaffaCakes118
Files
-
37fa96d6acb2b6e8e3329012043b4f98_JaffaCakes118.exe windows:5 windows x86 arch:x86
37f66cec8d7a60de810c3e930ed037b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharNextA
GetParent
GetSystemMetrics
TranslateMessage
GetDC
GetDesktopWindow
kernel32
lstrcmpiA
VirtualAlloc
GlobalFindAtomA
lstrcmpA
lstrcmpiW
lstrlenA
QueryPerformanceCounter
CopyFileA
VirtualFree
GetWindowsDirectoryA
GetCommandLineA
lstrlenW
RemoveDirectoryW
FindClose
GetModuleHandleA
RemoveDirectoryA
DeleteFileA
gdi32
RectVisible
LineTo
CreatePalette
GetStockObject
CreateFontIndirectA
GetClipBox
GetObjectA
SelectObject
CreateCompatibleDC
CreateSolidBrush
SetTextAlign
RestoreDC
SetTextColor
GetDeviceCaps
DeleteDC
SetMapMode
SetStretchBltMode
SaveDC
GetTextMetricsA
GetPixel
SelectPalette
glu32
gluNurbsCallback
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE