Static task
static1
Behavioral task
behavioral1
Sample
59ad9be5c3c97911453b60086f1de895_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
59ad9be5c3c97911453b60086f1de895_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
59ad9be5c3c97911453b60086f1de895_JaffaCakes118
-
Size
130KB
-
MD5
59ad9be5c3c97911453b60086f1de895
-
SHA1
1c8686b64f5929897c831de0fd8f4f37fc27831c
-
SHA256
356aebc82276f03e2323bf8f57f8380cf1203bbb9db846a401a078bce40c6010
-
SHA512
c457aac7c2b9fd574833cd3a8f3abb31b3cbb5cc5c402fd007a02faf0a6818e4ff2a6e6c87af8f07aeb908fc5bc8aaa479f08e62e7fb1e70aedd74925adf8e9a
-
SSDEEP
1536:FZutrtbwZya5qVnHNI8WY0/Y36GvzJ9u/yZcsruSA8XuuKsjQM:F8trtboBkZHMY0CBJXuNgQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 59ad9be5c3c97911453b60086f1de895_JaffaCakes118
Files
-
59ad9be5c3c97911453b60086f1de895_JaffaCakes118.exe windows:4 windows x86 arch:x86
16e670c11489f67fda7065af95023619
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
VirtualAlloc
GetStartupInfoA
GetVersion
VirtualFree
lstrcmpiA
lstrlenA
GetModuleHandleA
gdi32
CreateFontIndirectA
SetBkMode
SelectObject
CreatePalette
SaveDC
user32
CharNextA
GetDesktopWindow
DispatchMessageA
TranslateMessage
GetDC
GetSystemMetrics
glu32
gluTessCallback
comctl32
InitCommonControls
Sections
.text Size: 1024B - Virtual size: 813B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Opbrssnv Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ