Static task
static1
Behavioral task
behavioral1
Sample
6a5abfad245cbb04561a5654f9c88e71_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6a5abfad245cbb04561a5654f9c88e71_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6a5abfad245cbb04561a5654f9c88e71_JaffaCakes118
-
Size
215KB
-
MD5
6a5abfad245cbb04561a5654f9c88e71
-
SHA1
962a9fb1659e16fd1f178c8ab405734f4c348d1c
-
SHA256
5662a49f0a61cf7ea63e500ebf3cd105c3e5b1f1b3ae39414c00715a97bcf97b
-
SHA512
014dca06104cef9b8d67a81b119a5bac42c0590ea2d950daf405ac5f4510ccfe468344d52bcf5516ae58dc90ce8df66b382ee05c5733c876a09a3016236292ab
-
SSDEEP
3072:7+HubrstvlTcArKRcNcYX3A083XLIr1I2j9:uubgTTcArcf0y7I5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6a5abfad245cbb04561a5654f9c88e71_JaffaCakes118
Files
-
6a5abfad245cbb04561a5654f9c88e71_JaffaCakes118.exe windows:4 windows x86 arch:x86
f53b3b0a4c66ae69d1735bdc44321ccd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
CreateThread
Sleep
GetStartupInfoA
GlobalFree
user32
SendMessageA
GetDlgItem
CreateWindowExA
SetWindowTextA
SendDlgItemMessageA
GetWindowTextLengthA
GetWindowRect
SetWindowPos
SetDlgItemTextA
GetClientRect
GetMessageA
SetDlgItemInt
MessageBoxA
PostQuitMessage
DefWindowProcA
DispatchMessageA
LoadIconA
LoadCursorA
LoadImageA
RegisterClassExA
ShowWindow
UpdateWindow
TranslateMessage
gdi32
GetStockObject
CreateSolidBrush
CreateFontIndirectA
GetObjectA
ole32
CoInitialize
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
msvcrt
memcpy
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_EH_prolog
__CxxFrameHandler
strcmp
memmove
getenv
malloc
sprintf
??2@YAPAXI@Z
memset
strlen
_except_handler3
_stricmp
Sections
.text Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 135KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE