ZvQsOoC2hIrY
Static task
static1
Behavioral task
behavioral1
Sample
41eb0e66ee7fe06717214b5a6202eac8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
41eb0e66ee7fe06717214b5a6202eac8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
41eb0e66ee7fe06717214b5a6202eac8_JaffaCakes118
-
Size
246KB
-
MD5
41eb0e66ee7fe06717214b5a6202eac8
-
SHA1
be6237279379fa49ddefa639f4e38c0d6171d422
-
SHA256
23f1eb23bd65be0e30760b6ef6ee0008d37e5f81ba0e2807c28c81f17c1d0262
-
SHA512
ffaa107359ecbe1f78098f40ee64ad8bef60a89d96168535bc33f73fc6fdf15b611d3f0f1746dfa6c4e36a4032ea419c06fc0c479d54d9ca8473ec5e7d2c4f13
-
SSDEEP
6144:YC7GgUxXLYPTLM8/DtMbh7ZbPZgnRDNIN4gYQA:LCLYPg1ZbPZ62tA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41eb0e66ee7fe06717214b5a6202eac8_JaffaCakes118
Files
-
41eb0e66ee7fe06717214b5a6202eac8_JaffaCakes118.exe windows:4 windows x86 arch:x86
4e2bce302c75471daf5a280ae1e1fe35
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerInstallFileA
GetFileVersionInfoA
GetFileVersionInfoSizeA
user32
DrawFrameControl
SetPropA
DrawAnimatedRects
GetMenuItemInfoA
IsCharLowerA
MoveWindow
GetDC
LoadKeyboardLayoutA
ActivateKeyboardLayout
DrawTextA
GetSystemMenu
IsMenu
DispatchMessageW
SetWindowPos
IsChild
WaitMessage
DefMDIChildProcA
ShowOwnedPopups
GetScrollRange
DefFrameProcA
GetWindowTextLengthA
ClientToScreen
ScreenToClient
GetClassLongA
IsDialogMessageW
GetWindowThreadProcessId
UnregisterClassA
GetWindowDC
DefWindowProcA
GetClientRect
EnableScrollBar
TranslateMessage
GetClipboardData
GetClassNameA
GetDCEx
IntersectRect
GetMenu
RegisterClassA
CharLowerA
SetCursor
IsDialogMessageA
MessageBoxA
GetTopWindow
ShowWindow
GetSysColorBrush
RemoveMenu
IsCharUpperA
SetWindowLongA
GetKeyboardLayout
GetClassInfoA
PeekMessageA
RegisterClipboardFormatA
MsgWaitForMultipleObjects
CreatePopupMenu
ScrollWindow
DestroyWindow
SetCapture
GetWindowTextA
CharUpperBuffA
DrawIcon
IsDlgButtonChecked
IsZoomed
shell32
SHGetSpecialFolderLocation
SHGetDiskFreeSpaceA
SHGetFolderPathA
SHGetDesktopFolder
kernel32
GetOEMCP
VirtualAllocEx
SetHandleCount
GetFileAttributesA
FindResourceA
DeleteCriticalSection
LockResource
ReadFile
lstrcmpA
MoveFileExA
GetModuleFileNameA
CloseHandle
LoadLibraryA
lstrcpynA
GetSystemDefaultLangID
GetProcAddress
GetUserDefaultLCID
GetStdHandle
GetStartupInfoA
GetProcessHeap
ExitProcess
GlobalFindAtomA
Exports
Exports
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 198KB - Virtual size: 198KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.badata Size: 512B - Virtual size: 497B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ