Static task
static1
Behavioral task
behavioral1
Sample
5dfea8c354bf16e035cf43fc7b753622_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5dfea8c354bf16e035cf43fc7b753622_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5dfea8c354bf16e035cf43fc7b753622_JaffaCakes118
-
Size
286KB
-
MD5
5dfea8c354bf16e035cf43fc7b753622
-
SHA1
fbdad5c06405f2e3dc1f9bdcaa8cd42c7711e4f3
-
SHA256
67686b45918053faf68fd7480d40c8e657b77f6aaf45e07b4c902f8e0bf27494
-
SHA512
0f0141ad1105c8c53c43a47070237a931eacacaf84ef0e5d7975480cc46d1d110c7ac8d6f82d71063a3a9b216b2bd4b29916da03949e1a24af4d308949fd6286
-
SSDEEP
6144:Ivoq2CIKh5J4STNUSg37Z1CLJLYPtIk44zw+K1cDHAKi8yK:Ivo69hcSKN7Z14J+bFK10H5iZK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5dfea8c354bf16e035cf43fc7b753622_JaffaCakes118
Files
-
5dfea8c354bf16e035cf43fc7b753622_JaffaCakes118.exe windows:4 windows x86 arch:x86
728c9e9b8662a1db27a63dda0f06d9c8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
CreateThread
GetTickCount
ExitProcess
Sleep
GetStartupInfoA
user32
GetAsyncKeyState
GetClientRect
FillRect
MessageBoxA
DefWindowProcA
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
UpdateWindow
ShowWindow
CreateWindowExA
GetDC
LoadCursorA
RegisterClassA
LoadIconA
gdi32
SelectObject
CreateCompatibleDC
CreateSolidBrush
CreateCompatibleBitmap
SetBkMode
BitBlt
SetTextColor
ole32
CoInitialize
msvcp60
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
?length@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIABV12@I@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
msvcrt
??2@YAPAXI@Z
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
__CxxFrameHandler
strcmp
srand
rand
strlen
_except_handler3
memcpy
memset
_stricmp
sprintf
malloc
getenv
memmove
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 264KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ