Static task
static1
Behavioral task
behavioral1
Sample
a85099dbdce5a6832dae4b1298392d8d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a85099dbdce5a6832dae4b1298392d8d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a85099dbdce5a6832dae4b1298392d8d_JaffaCakes118
-
Size
137KB
-
MD5
a85099dbdce5a6832dae4b1298392d8d
-
SHA1
bf5749ad1090fd8ca86705d51a5c9a3b55ac5624
-
SHA256
c9de31714db0e8dc8211f31904c3f7b802c329c1e0e5b2ca986836fe618a3d23
-
SHA512
988d0aa9db56efb0f3e587589c42cdc0ba4196aa88d6dc60623b6e33f4da67d99b4c63fb0de9112f9c08f751f92e75245060093a65c238d2c2e0ec9f1992137a
-
SSDEEP
3072:E9j+YpH1uYI4alIruBpscWRsrkPFtd2HcZOe7nl:K1HQYI4alIrubsi4f2HcZOMl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a85099dbdce5a6832dae4b1298392d8d_JaffaCakes118
Files
-
a85099dbdce5a6832dae4b1298392d8d_JaffaCakes118.exe windows:5 windows x86 arch:x86
28a5d6c105b8803b920d9ef666e4b119
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
lstrcmpiA
CopyFileA
QueryPerformanceCounter
GetSystemTime
GlobalFindAtomA
lstrlenA
RemoveDirectoryA
GetCommandLineA
DeleteFileA
lstrcmpiW
GetWindowsDirectoryA
lstrcmpA
RemoveDirectoryW
FindClose
lstrlenW
VirtualAlloc
VirtualFree
user32
GetSystemMetrics
TranslateMessage
GetDesktopWindow
GetDC
GetParent
CharNextA
gdi32
SelectObject
DeleteObject
SetStretchBltMode
SetMapMode
RestoreDC
GetStockObject
GetClipBox
GetTextMetricsA
DeleteDC
CreatePalette
GetPixel
LineTo
SetTextAlign
SelectPalette
SaveDC
GetDeviceCaps
GetObjectA
CreateCompatibleDC
RectVisible
SetTextColor
CreateFontIndirectA
CreateSolidBrush
glu32
gluNurbsCallback
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE