Static task
static1
Behavioral task
behavioral1
Sample
69970524622de4a7b2b66b4ee8ebdd3c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
69970524622de4a7b2b66b4ee8ebdd3c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
69970524622de4a7b2b66b4ee8ebdd3c_JaffaCakes118
-
Size
843KB
-
MD5
69970524622de4a7b2b66b4ee8ebdd3c
-
SHA1
ceb696fb039cf3b3c768585ea781184f944a3f40
-
SHA256
b728da633d1cc0b8f052d14895ff21e4c0cf1017971f7559a57fc0a633bc8612
-
SHA512
2284b0b7cdfc62c4fe28870a484f17ba2c4ca99cf0c379125b07391864af22fe2bf84733e969ae12070e03a8c9dc48a3a4274ecf1125390b03e38c9c04c29158
-
SSDEEP
24576:47YGDRrYwTQ+rPcK1rwcIDTooneh1U86//dqBzuKzM:4ZReOPcUwXDToqehWb3dqB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 69970524622de4a7b2b66b4ee8ebdd3c_JaffaCakes118
Files
-
69970524622de4a7b2b66b4ee8ebdd3c_JaffaCakes118.exe windows:1 windows x86 arch:x86
4400aee9e1319cf6c97fdc5a1cad4bd0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GlobalAddAtomA
GetModuleHandleA
LoadLibraryA
VirtualAlloc
VirtualFree
GetModuleFileNameA
ExitProcess
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
ShowWindow
MessageBoxA
MessageBoxA
advapi32
RegQueryValueExA
oleaut32
SysFreeString
version
GetFileVersionInfoA
gdi32
GetCurrentPositionEx
ole32
IsEqualGUID
comctl32
ImageList_Write
shell32
Shell_NotifyIconA
comdlg32
GetOpenFileNameA
gesoft
FuckWorld
Sections
.xyang Size: - Virtual size: 580KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xyang Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xyang Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xyang Size: - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xyang Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xyang Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xyang Size: - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xyang Size: 93KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xyang Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xyang Size: - Virtual size: 352KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_WRITE
.xyang Size: - Virtual size: 654KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 252B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.xyang Size: - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 748KB - Virtual size: 747KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 92B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ