Static task
static1
Behavioral task
behavioral1
Sample
38f3e482db3dafb6a96b02cff6c87ec4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
38f3e482db3dafb6a96b02cff6c87ec4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
38f3e482db3dafb6a96b02cff6c87ec4_JaffaCakes118
-
Size
109KB
-
MD5
38f3e482db3dafb6a96b02cff6c87ec4
-
SHA1
ab1c80fe802eb5b6d0cc1998fb4f0e258d68df2d
-
SHA256
c9bb1317363fb7ade72aec2742baf0f6fe72c559d05c7cfc29b31f35c435d72b
-
SHA512
2f8a8da45365841e9c721c38b8288b58f32e9f344fb88eb2faf908a9de7c2981f9b976346e30b12edd61a549917c4ae038baadfcc1984e0f02d5d83a398c188b
-
SSDEEP
1536:nPzvdtRfy3mUtyktvdMC4iaJJmRqwQzZMn2AINjYDCh7e74uViTiX6hS/u6zm:LFtRfAmUs+mN/JGANjDBzdS/u6z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 38f3e482db3dafb6a96b02cff6c87ec4_JaffaCakes118
Files
-
38f3e482db3dafb6a96b02cff6c87ec4_JaffaCakes118.exe windows:5 windows x86 arch:x86
cc636670d00c7152418361a64f214453
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharNextA
GetParent
GetDesktopWindow
GetDC
TranslateMessage
GetSystemMetrics
kernel32
lstrcmpA
GetWindowsDirectoryA
DeleteFileA
GetCommandLineA
lstrlenW
GetModuleHandleA
GetSystemTime
RemoveDirectoryA
GlobalFindAtomA
lstrcmpiW
CopyFileA
QueryPerformanceCounter
RemoveDirectoryW
FindClose
lstrcmpiA
VirtualAlloc
lstrlenA
VirtualFree
gdi32
GetClipBox
CreatePalette
GetPixel
GetTextMetricsA
SelectObject
SelectPalette
RestoreDC
GetStockObject
GetDeviceCaps
GetObjectA
LineTo
CreateSolidBrush
SaveDC
CreateFontIndirectA
SetStretchBltMode
DeleteDC
RectVisible
DeleteObject
CreateCompatibleDC
SetTextAlign
glu32
gluNurbsCallback
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ