Static task
static1
Behavioral task
behavioral1
Sample
4375c207a63997dc48576fce94efc634_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4375c207a63997dc48576fce94efc634_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4375c207a63997dc48576fce94efc634_JaffaCakes118
-
Size
1.6MB
-
MD5
4375c207a63997dc48576fce94efc634
-
SHA1
32c38d022f38346e79d396e4dde07123a1fb380f
-
SHA256
ca9224f178cbf5f98efa2a6d444c22d74f62e6bff522fb11b3718116f534d856
-
SHA512
5b2b7d92fcb4edfba78f6b8889f289ce529ef322c63906c1e527a41f198a9a7fa555e503019ce5a95e429a0ff73f237aa8e9c150fda0d8eb2b4a0fea3c6123fe
-
SSDEEP
49152:s4F+nvFjWL3wkuP6sGx5fgbypJ6N/vbJ:7F0t+3wkuPDG7PJ4v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4375c207a63997dc48576fce94efc634_JaffaCakes118
Files
-
4375c207a63997dc48576fce94efc634_JaffaCakes118.exe windows:5 windows x86 arch:x86
9d8618b92050d8cb75b630643fa2276a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
dbghelp
MakeSureDirectoryPathExists
psapi
GetModuleFileNameExA
user32
DrawFrameControl
gdi32
GetLayout
msimg32
AlphaBlend
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
advapi32
RegEnumValueA
shell32
DragQueryFileA
comctl32
ImageList_GetIconSize
shlwapi
PathFindFileNameA
ole32
OleFlushClipboard
oleaut32
SysFreeString
oledlg
ord8
gdiplus
GdipDrawImageRectI
version
GetFileVersionInfoA
oleacc
AccessibleObjectFromWindow
wininet
InternetWriteFile
imm32
ImmGetContext
Sections
.text Size: 1.6MB - Virtual size: 3.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE