Static task
static1
Behavioral task
behavioral1
Sample
8bbeaf77531b86174d460a72485bdefd_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8bbeaf77531b86174d460a72485bdefd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8bbeaf77531b86174d460a72485bdefd_JaffaCakes118
-
Size
113KB
-
MD5
8bbeaf77531b86174d460a72485bdefd
-
SHA1
a2e9da8a35156fe928fd1b98565de3f8efbf96c5
-
SHA256
c8bf67ec0453713dee14ce3f1ea4b3d2f921ae29dceb6b567b3a5d8356e80dab
-
SHA512
aa97818f1431a8009f2da0b8dcad83d9e2a0bb17f35f42ce504ab660a73b479d290398b1b3d4fc043dbd9b336970261f76abeea1d0539ad5ae364f8ae94a1b9f
-
SSDEEP
1536:8AXn+rWDRzDxOq31cQ6D8eGiSiQJo6x6oFViQlpgx6HqtS+JFLlUiIs1Xx6Zqn25:8AX++zDxOqFcQEGiSrJWUglJ/6Zqn2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8bbeaf77531b86174d460a72485bdefd_JaffaCakes118
Files
-
8bbeaf77531b86174d460a72485bdefd_JaffaCakes118.exe windows:5 windows x86 arch:x86
c50e8054c1b0ad2b5ce72e055b3a6963
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
QueryPerformanceCounter
GlobalFindAtomA
lstrcmpA
CopyFileA
lstrlenA
GetCommandLineA
lstrcmpiA
DeleteFileA
lstrcmpiW
GetModuleHandleA
GetSystemTime
VirtualAlloc
GetWindowsDirectoryA
VirtualFree
lstrlenW
RemoveDirectoryW
FindClose
user32
GetSystemMetrics
TranslateMessage
CharNextA
GetDesktopWindow
GetParent
GetDC
gdi32
GetTextMetricsA
CreatePalette
SetStretchBltMode
SetMapMode
RectVisible
CreateFontIndirectA
SelectObject
DeleteDC
GetObjectA
SetTextAlign
LineTo
SetTextColor
SelectPalette
GetDeviceCaps
DeleteObject
RestoreDC
CreateCompatibleDC
CreateSolidBrush
GetClipBox
GetStockObject
glu32
gluNurbsCallback
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ