Static task
static1
Behavioral task
behavioral1
Sample
7169b1712a722ef5d4b1ae595bf67289_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7169b1712a722ef5d4b1ae595bf67289_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7169b1712a722ef5d4b1ae595bf67289_JaffaCakes118
-
Size
113KB
-
MD5
7169b1712a722ef5d4b1ae595bf67289
-
SHA1
86290b9ac2fee1f2eca8dc1d9b21fde242d9dc30
-
SHA256
1c3a0c878c8447651adb14f2c08df1e195d6212b9e19d279cd82ac0e3770f2c6
-
SHA512
e4c54d3486dd9fd49a23630788fe4df09f458d07f1b34dae989dd98516e43ec3bae1616c968543f8bdfb10bfa8e6511f79ac4b2c6915b53d1b2645af7abc4abe
-
SSDEEP
3072:yuuYG+ZNVstQNiC3E3C5q2Tcgdr/DgMHYlM66CZ6vq:1uVZQNi+I0gMa6CZ6C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7169b1712a722ef5d4b1ae595bf67289_JaffaCakes118
Files
-
7169b1712a722ef5d4b1ae595bf67289_JaffaCakes118.exe windows:1 windows x86 arch:x86
9fda945c5d02e73d926c5e662b9b3161
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CompareFileTime
GetDiskFreeSpaceA
GetExitCodeProcess
GetFileSize
GetLastError
GetModuleHandleA
GetProcAddress
GetTickCount
LoadLibraryA
SearchPathA
Sleep
UnmapViewOfFile
VirtualAlloc
VirtualFree
lstrcatA
lstrcmpA
lstrlenA
gdi32
CreateBrushIndirect
CreateFontIndirectA
DeleteObject
GetDeviceCaps
SetBkColor
SetTextColor
user32
AppendMenuA
EndDialog
EqualRect
FindWindowExA
GetMenu
GetMessagePos
InvalidateRect
IsCharUpperA
LoadCursorA
PostQuitMessage
ScreenToClient
SetCaretPos
TrackPopupMenuEx
Sections
.data Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspr Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE