Static task
static1
Behavioral task
behavioral1
Sample
94bf99c338c305c90504bbabbc71f1f3_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
94bf99c338c305c90504bbabbc71f1f3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
94bf99c338c305c90504bbabbc71f1f3_JaffaCakes118
-
Size
8KB
-
MD5
94bf99c338c305c90504bbabbc71f1f3
-
SHA1
60d066c36bfc16efd2f8d32b31ab5be6be4e389a
-
SHA256
92218ec8128be202172cfbb535ed46d3982f0a6f7f39e8c1347050dd5f70bc99
-
SHA512
870f2d2a3cba64f9d205a53abcf21782050875bca32eb20d48a9b888663e4b490bed7ef49ba7f6c7bc01d4f879a2fcd4949192c305991d60bb168c9a04a1127c
-
SSDEEP
96:5Nv3I/jSKAajQ654LvdkTogtjYwz7Sx+h6:5NANAajQtLvdmfjYwz7SL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 94bf99c338c305c90504bbabbc71f1f3_JaffaCakes118
Files
-
94bf99c338c305c90504bbabbc71f1f3_JaffaCakes118.exe windows:4 windows x86 arch:x86
2ad047431b01283ac727e83928958247
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
DeleteDC
GetPixel
ExtFloodFill
DeleteObject
CreateSolidBrush
SelectObject
CreateCompatibleDC
user32
SendMessageA
SetMenu
ShowWindow
TranslateMessage
RegisterClassExA
LoadMenuA
GetSysColor
MessageBoxA
MoveWindow
LoadIconA
LoadCursorA
GetSystemMetrics
GetMessageA
EndPaint
DispatchMessageA
DefWindowProcA
CreateWindowExA
BeginPaint
UpdateWindow
PostQuitMessage
kernel32
GetModuleHandleA
GetCommandLineA
ExitProcess
comctl32
CreateStatusWindowA
InitCommonControls
comdlg32
GetSaveFileNameA
GetOpenFileNameA
shell32
ShellAboutA
DragQueryFileA
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 860B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE