Static task
static1
Behavioral task
behavioral1
Sample
8ec4d4f7565bdf5b4710f0102c1098ff_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8ec4d4f7565bdf5b4710f0102c1098ff_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8ec4d4f7565bdf5b4710f0102c1098ff_JaffaCakes118
-
Size
106KB
-
MD5
8ec4d4f7565bdf5b4710f0102c1098ff
-
SHA1
8dc152453af90dee27611e1efadc2a003927c035
-
SHA256
92d7e4b43b00df9d8d2af07220785b381973a3dccbc444b2b3eacd3103798000
-
SHA512
9c467c50b0a0713199c9016912efd86112a146183ac1c829bec0e87bbc39252ebaa3a34fd8317ca33b755f1f4ff28b74e2aadc7052e0938b344eaefaf8efff41
-
SSDEEP
1536:GnMvWU/CX5dIXY4YHwhb2XxawpUvcFc/Mvy+n+RXrN3i6EkVW4Hte3Ek07:xvGJ0YHY2X0kc/Ms7A4Hte3w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8ec4d4f7565bdf5b4710f0102c1098ff_JaffaCakes118
Files
-
8ec4d4f7565bdf5b4710f0102c1098ff_JaffaCakes118.exe windows:5 windows x86 arch:x86
a1cf74e23fda7bb599addb75acdae395
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetClipBox
GetTextMetricsA
CreateCompatibleDC
GetStockObject
GetObjectA
GetPixel
LineTo
SetTextColor
SelectObject
RestoreDC
CreateSolidBrush
SetStretchBltMode
SetTextAlign
DeleteObject
SaveDC
RectVisible
GetDeviceCaps
DeleteDC
SelectPalette
CreatePalette
SetMapMode
CreateFontIndirectA
kernel32
GetWindowsDirectoryA
lstrlenA
GetSystemTime
GetCommandLineA
QueryPerformanceCounter
lstrcmpiA
lstrlenW
GlobalFindAtomA
RemoveDirectoryA
CopyFileA
lstrcmpA
RemoveDirectoryW
FindClose
lstrcmpiW
GetModuleHandleA
DeleteFileA
VirtualAlloc
VirtualFree
user32
GetDC
GetSystemMetrics
TranslateMessage
GetParent
CharNextA
GetDesktopWindow
glu32
gluNurbsCallback
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ