Static task
static1
Behavioral task
behavioral1
Sample
7888456e7bddf55f8c6438394ef70ba4_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7888456e7bddf55f8c6438394ef70ba4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7888456e7bddf55f8c6438394ef70ba4_JaffaCakes118
-
Size
50KB
-
MD5
7888456e7bddf55f8c6438394ef70ba4
-
SHA1
65d8a80cf5242e6b30bb866fdfac38b07de46434
-
SHA256
5970aecdbe476e285df3eb111df659851901832927ef0be81843f61398c5192e
-
SHA512
c033e6e436e4e9365b54e28b1ed7a0ba96fea49bf140e755c770d8fc1a62614d305e8ce29d00b32deae1912abd8cbb3bec5c60d13f3bb33ec5054debe906aa6b
-
SSDEEP
768:jgIkfrayOUNH0QOnkuDg5Ikv9cSOdAIQDlv6zAV:OfrayOqUQYNKIkvWScAIQD16zA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7888456e7bddf55f8c6438394ef70ba4_JaffaCakes118
Files
-
7888456e7bddf55f8c6438394ef70ba4_JaffaCakes118.exe windows:4 windows x86 arch:x86
32165c1e4f6e9665cdb70e69a447b091
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
GetCommandLineA
GetModuleHandleA
GetTickCount
Sleep
GetStdHandle
CloseHandle
user32
CreateWindowExA
GetMessageA
BeginPaint
GetWindowRect
GetClientRect
GetFocus
PostQuitMessage
DefWindowProcA
EndDialog
MessageBoxA
msvcrt
_initterm
__set_app_type
toupper
__CxxFrameHandler
_c_exit
__getmainargs
_XcptFilter
exit
_controlfp
rand
_acmdln
_adjust_fdiv
__p__fmode
__p__commode
wcslen
wcschr
_exit
_except_handler3
gdi32
CreateSolidBrush
DeleteObject
SetPixel
GetBkColor
BitBlt
SelectObject
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ