Static task
static1
Behavioral task
behavioral1
Sample
66407243c28a2f5f3e52528e14dfd2fe_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
66407243c28a2f5f3e52528e14dfd2fe_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
66407243c28a2f5f3e52528e14dfd2fe_JaffaCakes118
-
Size
108KB
-
MD5
66407243c28a2f5f3e52528e14dfd2fe
-
SHA1
7209f9f3859e62b724e82aa4298a86e1fe456b23
-
SHA256
c7cd26a2b995589733014362f0c951d235ed1775f3429fbeaec59c411ac8505d
-
SHA512
be03e0f0b7dbcc77c5036064c4cbc491eca42fdd0be771c9d6f9eaa496fbbeafaf1c4cd304d0e1d3f2537d4f38f978b76b72553d33e86ea4844ce667265d63d4
-
SSDEEP
1536:HufcViBl3KkltPOc0NakOLeBwbQveKVUlW20u0yW87/HdTZjG3i6ElWDBbMpN:Of8iBQkl5p0NLOqfhgWTvU1iDBbMp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 66407243c28a2f5f3e52528e14dfd2fe_JaffaCakes118
Files
-
66407243c28a2f5f3e52528e14dfd2fe_JaffaCakes118.exe windows:4 windows x86 arch:x86
7a6a8559889dd71c570740f53e3a597e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDesktopWindow
GetDC
TranslateMessage
GetParent
GetSystemMetrics
CharNextA
gdi32
GetClipBox
SetStretchBltMode
SaveDC
GetTextMetricsA
GetDeviceCaps
DeleteObject
CreateCompatibleDC
SelectObject
DeleteDC
CreatePalette
SetTextColor
GetPixel
RestoreDC
CreateFontIndirectA
GetObjectA
SetTextAlign
CreateSolidBrush
RectVisible
GetStockObject
SetMapMode
SelectPalette
kernel32
QueryPerformanceCounter
lstrlenW
GetModuleHandleA
CopyFileA
RemoveDirectoryA
lstrlenA
GetCommandLineA
GlobalFindAtomA
VirtualAlloc
GetWindowsDirectoryA
GetSystemTime
VirtualFree
RemoveDirectoryW
FindClose
DeleteFileA
lstrcmpiA
lstrcmpA
lstrcmpiW
glu32
gluNurbsCallback
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ