C:\Seek\Lost\Found\Include.exe
Static task
static1
Behavioral task
behavioral1
Sample
3a6bd2b927f84684c4884b88d617f0bc_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3a6bd2b927f84684c4884b88d617f0bc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3a6bd2b927f84684c4884b88d617f0bc_JaffaCakes118
-
Size
191KB
-
MD5
3a6bd2b927f84684c4884b88d617f0bc
-
SHA1
a62f73c4d18a5aee13ee8c90dfd2ca75071a8389
-
SHA256
8dc30d69be20d1da4eaa54c884833bda454f2edc51daa4effbb88a1ab95a4376
-
SHA512
54780bf8a05cfe6cd337e64ab5dae3342bad3fa2a916c10163acda431387122c322e4994a94860023716eb0fb8288659a7ca7652e3a4f2ac6958a793d3c51ed7
-
SSDEEP
3072:PTcFkQST3wCq6G3JnX6wwO55dfxZKUdh6g9fI2iz76BHEtdN/fmnmZSmGbFh:P4nEV6VLwO1dGg9c2EtLOnmZH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a6bd2b927f84684c4884b88d617f0bc_JaffaCakes118
Files
-
3a6bd2b927f84684c4884b88d617f0bc_JaffaCakes118.exe windows:5 windows x86 arch:x86
376594d5f36870a9684820c2ec861794
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
SetViewportOrgEx
CreateDIBitmap
GetTextMetricsA
SetBkMode
CreatePen
CreatePenIndirect
ExtFloodFill
CreatePolyPolygonRgn
RectVisible
GetTextFaceW
GetClipBox
user32
CharNextW
SetSysColors
GetKeyboardLayoutNameW
SendMessageTimeoutW
LoadMenuA
DestroyIcon
GetClassNameW
WindowFromPoint
GetKeyboardLayout
DefMDIChildProcA
IsCharUpperA
PtInRect
ScrollWindowEx
SetFocus
LoadMenuW
GetMenuStringW
LoadCursorA
ShowWindow
SendMessageA
ArrangeIconicWindows
GetActiveWindow
LoadCursorW
GetMenuItemID
SetScrollInfo
MessageBoxExW
kernel32
OpenEventW
FlushFileBuffers
SetWaitableTimer
GetSystemTimeAdjustment
LoadLibraryExW
GetOverlappedResult
GetPriorityClass
SetEvent
ole32
CoInitialize
Exports
Exports
_IsMenuIsMenuIsMenuIsMenuIsMenuIsMenuIsMenuIsMenuIsMenuIsMenuIsMenu@0WxMPwWAHfFFAYTmZ�B
Sections
.dbgdir Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.fggdf Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vptr1 Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wewew Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vbvbg Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ewerw Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ