Static task
static1
Behavioral task
behavioral1
Sample
4c2340ea0441e67ea36eb5adcd31db26_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4c2340ea0441e67ea36eb5adcd31db26_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4c2340ea0441e67ea36eb5adcd31db26_JaffaCakes118
-
Size
116KB
-
MD5
4c2340ea0441e67ea36eb5adcd31db26
-
SHA1
cdea3bb5d7c8097f16fc7b1192d41b72e8edf19f
-
SHA256
45b6abcc25b82d145ffceaa8c78e814caf2a08996de7f356f42cc79bccb8e7d0
-
SHA512
9746935df278b851c79e5a3e1b982083b937d7b40db551aeb1dadb7283d369e709bf9a6bb50dc174679f91a9aa83fb34adde2833cfc6bf04e0e1ad3670a28b5a
-
SSDEEP
1536:jKUBf8YUrXMWi2Zg0gKvBVKzeTLX3gf3ByGkQJZKTKuO+S0QSbi6EPLwOdLIbyWN:tf/8XMFmgLeTLAf3IcK9S0/2dLIbyWN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c2340ea0441e67ea36eb5adcd31db26_JaffaCakes118
Files
-
4c2340ea0441e67ea36eb5adcd31db26_JaffaCakes118.exe windows:5 windows x86 arch:x86
158f1ade962e85621f9b4b71ea128b9a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
RectVisible
CreateFontIndirectA
GetDeviceCaps
SetTextColor
SetStretchBltMode
DeleteDC
CreateCompatibleDC
GetObjectA
RestoreDC
LineTo
GetTextMetricsA
CreatePalette
DeleteObject
SetTextAlign
GetStockObject
SelectPalette
CreateSolidBrush
SaveDC
GetPixel
SetMapMode
GetClipBox
SelectObject
kernel32
GlobalFindAtomA
lstrlenA
GetWindowsDirectoryA
lstrlenW
VirtualAlloc
lstrcmpiA
GetModuleHandleA
DeleteFileA
VirtualFree
RemoveDirectoryW
RemoveDirectoryA
FindClose
CopyFileA
QueryPerformanceCounter
GetSystemTime
GetCommandLineA
lstrcmpiW
lstrcmpA
user32
GetSystemMetrics
TranslateMessage
GetDesktopWindow
CharNextA
GetDC
GetParent
glu32
gluNurbsCallback
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ