URdvyrmBa@8
Static task
static1
Behavioral task
behavioral1
Sample
668e11661eb54e1b93ce17cb96c2c5f3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
668e11661eb54e1b93ce17cb96c2c5f3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
668e11661eb54e1b93ce17cb96c2c5f3_JaffaCakes118
-
Size
100KB
-
MD5
668e11661eb54e1b93ce17cb96c2c5f3
-
SHA1
ce9f824f4e3dcdce39693bd34f735020bee8ad43
-
SHA256
793446e9ffc4182f88bee992c761bda3b36ffbf66d5456306f23ce34670bf1a5
-
SHA512
6eebf97998320e2951cf9170d44a328d25855e7449f7431fd84716c5619e22171d7c383799894b6202298b8584b00f27af330c2907018cac5de5da88e787c63b
-
SSDEEP
1536:g+ZxkiqzfcFDy95jCst6fZGq3+mzwK5aB+yipX6vXgozR0B4m9:nx0zEFDejLIxGq3gKG+yGmgoV0GE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 668e11661eb54e1b93ce17cb96c2c5f3_JaffaCakes118
Files
-
668e11661eb54e1b93ce17cb96c2c5f3_JaffaCakes118.exe windows:4 windows x86 arch:x86
e954d35a261032719bfd4fb5e306cdf7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
lstrlenW
GetFileAttributesA
IsBadHugeReadPtr
ExitProcess
GetSystemDefaultLangID
LoadLibraryA
GetVersionExA
GetEnvironmentStrings
Sleep
HeapDestroy
LoadResource
GetOEMCP
GetUserDefaultLCID
MulDiv
SetFilePointer
VirtualAlloc
MoveFileA
GetStringTypeW
SizeofResource
GetStartupInfoA
LockResource
GetLastError
GetFullPathNameA
FindResourceA
shell32
DragQueryFileA
shlwapi
SHQueryInfoKeyA
SHGetValueA
user32
SetWindowLongA
IsDialogMessageA
GetKeyboardState
SetRect
CharNextW
OpenClipboard
SetWindowPlacement
PeekMessageA
DestroyMenu
IsZoomed
EqualRect
GetMessagePos
GetTopWindow
GetKeyState
ShowOwnedPopups
AdjustWindowRectEx
DefMDIChildProcA
GetDlgItem
GetWindowLongW
GetClientRect
IsCharUpperA
LoadCursorA
UnhookWindowsHookEx
SetMenuItemInfoA
IsChild
DispatchMessageA
GetScrollInfo
GetPropA
FrameRect
GetSubMenu
EndDialog
TrackPopupMenu
IsCharLowerA
RemovePropA
CreateMenu
WindowFromPoint
GetMenuItemInfoA
PostQuitMessage
GetMenuStringA
IntersectRect
FindWindowA
GetLastActivePopup
SetScrollPos
GetWindowLongA
SetFocus
GetCursor
GetSystemMenu
IsWindowUnicode
PeekMessageW
CallNextHookEx
GetWindowDC
MapWindowPoints
GetMenuItemCount
LoadKeyboardLayoutA
SetCapture
GetScrollRange
PostMessageA
CharUpperA
RegisterClassA
GetMenu
EnableMenuItem
InsertMenuA
SetWindowsHookExA
CloseClipboard
Exports
Exports
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.badata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ