Static task
static1
Behavioral task
behavioral1
Sample
3f4338d94d4a7b9ad3f8b64a46636fc6_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3f4338d94d4a7b9ad3f8b64a46636fc6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3f4338d94d4a7b9ad3f8b64a46636fc6_JaffaCakes118
-
Size
105KB
-
MD5
3f4338d94d4a7b9ad3f8b64a46636fc6
-
SHA1
e777e251d31c64a651a0aa676aaf50d5905254cf
-
SHA256
932e9db1c1fcbd467dbbf319664b458b9423f366a226b674dca2970554cf25df
-
SHA512
bf47d61078c2a862c63584e432c4ad9673e3aed2d7ec054efd13232eab55043b7f3826e3705ab39d1d4f3b7329dd81c2eb51f16354ee408a0efbc1a7b44e2313
-
SSDEEP
1536:XDIHDr1XDh1rC65kAAB14cHI+kMeQUr1l4YECjW3ivtq/PK2MouI:ADrdDh1GBk+kMxUhl1sPK2Mol
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f4338d94d4a7b9ad3f8b64a46636fc6_JaffaCakes118
Files
-
3f4338d94d4a7b9ad3f8b64a46636fc6_JaffaCakes118.exe windows:4 windows x86 arch:x86
6d92dd30395c85e3eb99fd77636c2d23
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreatePalette
SelectPalette
DeleteDC
RestoreDC
GetDeviceCaps
GetTextMetricsA
CreateFontIndirectA
SetMapMode
GetPixel
SelectObject
SetStretchBltMode
SaveDC
GetStockObject
DeleteObject
LineTo
RectVisible
SetTextColor
CreateCompatibleDC
CreateSolidBrush
SetTextAlign
GetClipBox
GetObjectA
kernel32
GetCommandLineA
lstrlenW
VirtualAlloc
lstrcmpiW
GetWindowsDirectoryA
lstrcmpA
lstrcmpiA
CopyFileA
QueryPerformanceCounter
GetModuleHandleA
VirtualFree
GlobalFindAtomA
DeleteFileA
GetSystemTime
lstrlenA
RemoveDirectoryA
RemoveDirectoryW
FindClose
user32
TranslateMessage
GetParent
GetDesktopWindow
CharNextA
GetSystemMetrics
GetDC
glu32
gluNurbsCallback
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ