Static task
static1
Behavioral task
behavioral1
Sample
6f0aa92610a7ca7493a69ff226d6995b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6f0aa92610a7ca7493a69ff226d6995b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6f0aa92610a7ca7493a69ff226d6995b_JaffaCakes118
-
Size
144KB
-
MD5
6f0aa92610a7ca7493a69ff226d6995b
-
SHA1
03af0724627cfa31735129f9ca2652a7334cc90f
-
SHA256
82046b4bd82b3f30e6ba1b1d57c66d2f6485ecd3cd15868343824de122c74840
-
SHA512
2d4878d7df84234622ee372012483fba7aec89d02990b3c7c8544d6f740fd566d592ecd23a50d1abbd9b16593159abe3f9863be45dc98916851ffb1f5e067275
-
SSDEEP
3072:3tG/o6xm9ZvIlT4p65IgN267R1s40RXH0nd4HAEfCCrKmDkZPrgsdGC9NoH:d76xmLvWT4tgNZl1vEH0nAphrkJj39Ny
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6f0aa92610a7ca7493a69ff226d6995b_JaffaCakes118
Files
-
6f0aa92610a7ca7493a69ff226d6995b_JaffaCakes118.exe windows:1 windows x86 arch:x86
72873eefa466ad61f90ef42c0b3aa63d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CheckDlgButton
EnableMenuItem
GetCursorPos
GetDlgCtrlID
GetMenu
GetSysColor
InvalidateRect
IsDlgButtonChecked
KillTimer
LoadAcceleratorsA
LoadCursorA
MoveWindow
SetWindowPos
TrackPopupMenuEx
advapi32
A_SHAInit
RegEnumKeyA
RegLoadKeyA
RegOpenKeyExA
RegQueryValueA
kernel32
CreateFileA
ExitProcess
FreeLibrary
GetFileSize
GetModuleFileNameA
GetModuleHandleA
LoadLibraryA
ReadFile
ResumeThread
SearchPathA
SwitchToThread
VirtualAlloc
lstrcatA
lstrlenA
CopyFileExW
gdi32
CreateBrushIndirect
DeleteObject
EndDoc
FillPath
GetDeviceCaps
comctl32
FlatSB_EnableScrollBar
FlatSB_SetScrollProp
FlatSB_SetScrollRange
FlatSB_ShowScrollBar
Sections
.star Size: 1024B - Virtual size: 901B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.ssdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspm Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upx Size: 1024B - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ