Static task
static1
Behavioral task
behavioral1
Sample
897034932962f74e8455723107038078_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
897034932962f74e8455723107038078_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
897034932962f74e8455723107038078_JaffaCakes118
-
Size
40KB
-
MD5
897034932962f74e8455723107038078
-
SHA1
6edd85379d0ba59b0591bf8d4dfba8470cd4bf2a
-
SHA256
9d0a53bc7d6027882a9823203f5cfe855b7fba3903cf7b636768ebd1045f806a
-
SHA512
a780f568b1bc44f0803a88eb04c4bf0f8eb27a2659d00660897a4da92e5da954aad882ae7cbae2d103be8099333e56bde9a5558d7240dc06b57ff3383d29d8d6
-
SSDEEP
768:+BQ/pDDCDgtXZFCSYY+XEMK8H4W9Pxu8rhzFcEReI7Yogo:+qpDftXNYFXKW9Ju8roE57Yogo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 897034932962f74e8455723107038078_JaffaCakes118
Files
-
897034932962f74e8455723107038078_JaffaCakes118.exe windows:1 windows x86 arch:x86
dbcac4d4de2f384dd9f9afb290d27ef5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CompareFileTime
GetCommandLineA
GetDiskFreeSpaceA
GetExitCodeProcess
GetFileSize
GetLastError
GetModuleHandleA
GetProcAddress
GetTickCount
LoadLibraryA
SearchPathA
Sleep
SleepEx
UnmapViewOfFile
VirtualAlloc
VirtualFree
lstrcatA
lstrcmpA
lstrlenA
gdi32
CreateBrushIndirect
CreateFontIndirectA
DeleteObject
GetDeviceCaps
SetBkColor
SetTextColor
user32
AppendMenuA
EndDialog
EqualRect
FindWindowExA
GetMenu
GetMessagePos
InvalidateRect
IsCharUpperA
LoadCursorA
PostQuitMessage
ScreenToClient
SetCaretPos
TrackPopupMenuEx
Sections
.dAJG Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cBVD Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aTYK Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rNGH Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ