?NDJndjklIODUiuodjilkjDUIOioudIUODOI@@YGKEPA_WG@Z
Static task
static1
Behavioral task
behavioral1
Sample
73ea5fefc1a9a60c2126e37dbed7be01_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
73ea5fefc1a9a60c2126e37dbed7be01_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
73ea5fefc1a9a60c2126e37dbed7be01_JaffaCakes118
-
Size
250KB
-
MD5
73ea5fefc1a9a60c2126e37dbed7be01
-
SHA1
9239bc224d616176c204e0c1a0a3cb74d705b4c2
-
SHA256
4ae308aaca56ec28a0e4f7d7c1b437991e757a2ddc35b7e8d75ea0429a3201ff
-
SHA512
1a70ecc714beaaeca12b2c197e59b927f5d4aa1d8d80c99771ec303da9b960bb4d5177ea6cbdb14f8838ad719db03ae7ca147b6de28962d4ec6b10c1eddb0258
-
SSDEEP
6144:O3qY12vQCPqxpy//3RBaUnH82kdc4Ib3lU8Yh7Hc67V:Jsxpy//3RtH8227IZG5p
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 73ea5fefc1a9a60c2126e37dbed7be01_JaffaCakes118
Files
-
73ea5fefc1a9a60c2126e37dbed7be01_JaffaCakes118.exe windows:5 windows x86 arch:x86
309d1a432f33ef8640972aab11195eb7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
EnumFontFamiliesW
DeleteDC
EnumFontsW
ScaleViewportExtEx
ResizePalette
TextOutW
SelectClipRgn
ExtFloodFill
CreateICW
PathToRegion
SetPixel
CombineRgn
GetClipBox
GetTextMetricsA
GetNearestPaletteIndex
SetViewportOrgEx
EndDoc
user32
SetScrollRange
GetWindowTextLengthW
IsCharLowerA
ModifyMenuW
DrawFocusRect
GetUpdateRect
CascadeWindows
RemoveMenu
DeferWindowPos
GetWindowPlacement
EnableScrollBar
FillRect
IsChild
ShowScrollBar
GetDC
PostMessageW
FindWindowA
GetScrollPos
CharUpperW
MessageBoxA
DestroyIcon
DrawTextExW
PostThreadMessageW
WindowFromPoint
CreateCaret
EndDialog
IsWindowEnabled
SetWindowLongW
GetKeyboardType
CharUpperA
CharToOemBuffA
keybd_event
HiliteMenuItem
DialogBoxIndirectParamW
GetMessageTime
CharNextW
GetWindowRect
kernel32
GetVersionExA
lstrcpyA
WaitForMultipleObjectsEx
GetModuleFileNameA
HeapWalk
MoveFileW
GetShortPathNameA
IsValidLanguageGroup
GlobalFindAtomW
GetSystemTimeAsFileTime
GetThreadTimes
GetCurrentThreadId
SuspendThread
GetACP
SetThreadLocale
GetFullPathNameA
OpenFileMappingA
GlobalAddAtomA
ntdll
memset
Exports
Exports
Sections
.text Size: 154KB - Virtual size: 153KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.nfodat Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.point Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.temp Size: 512B - Virtual size: 346B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.port Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 53KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ