Static task
static1
Behavioral task
behavioral1
Sample
a19c359b89fbb8a784048dbace32e80a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a19c359b89fbb8a784048dbace32e80a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a19c359b89fbb8a784048dbace32e80a_JaffaCakes118
-
Size
244KB
-
MD5
a19c359b89fbb8a784048dbace32e80a
-
SHA1
ad26018a8adbe52aa190a3574579626f9e74a8bf
-
SHA256
c1f06aeeadba513d3f43ae9a83eb2945037d68b98560dc4ce541ccb222b207e1
-
SHA512
882e85425022c74277f411d4126c03d03698451aeba95fa2bb64edce809eba20faea4c06268d32c533614993eab71ee0e127ffbad4f93598ae5f75630cd0b0b1
-
SSDEEP
6144:wbsktLkAojKQQBfmaehRrN9m8nH/0oArhGC:wbsktgAojtdRpV/0oAFb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a19c359b89fbb8a784048dbace32e80a_JaffaCakes118
Files
-
a19c359b89fbb8a784048dbace32e80a_JaffaCakes118.exe windows:4 windows x86 arch:x86
34cebc370dd9168cd9226b9cf7c6bf6d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeExA
GetPrivateProfileStringA
GetProcessPriorityBoost
IsBadHugeReadPtr
DeleteAtom
GetProfileStringA
GetNumberOfConsoleMouseButtons
GetTempPathA
ReadConsoleInputW
GetConsoleScreenBufferInfo
WriteConsoleOutputA
EnumSystemCodePagesA
VerLanguageNameA
GetDriveTypeW
user32
DrawTextExA
PeekMessageW
CheckMenuItem
GetCursorPos
wsprintfA
TranslateAcceleratorW
DestroyCaret
gdi32
GetICMProfileA
GetTextExtentPoint32W
GetGlyphOutlineA
SetBkMode
DrawEscape
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 172KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data0 Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE