Static task
static1
Behavioral task
behavioral1
Sample
a54d5dde85570834467b6a6cc849d5f8_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a54d5dde85570834467b6a6cc849d5f8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a54d5dde85570834467b6a6cc849d5f8_JaffaCakes118
-
Size
219KB
-
MD5
a54d5dde85570834467b6a6cc849d5f8
-
SHA1
46d37b8775dee4c66ba0e67cfe9c29c1549a80ae
-
SHA256
4170e7cc6dc2a32cb2dadd4a43a294db000b54dda742efad1e4057ff6a4c2d73
-
SHA512
3a0d4b6e74316fe997b1c49ebad569219436c100315c306c703ec9d6748662c25cf12a9ebc8614e3efcac3104b2fca3b6f0393a5dc66c3396487bf7e6fb90fab
-
SSDEEP
3072:5FAidoXKqJ6+P4+2FIP3yDIrP/YNVYeaBmtTBfXumpE:5F5do6m4+278T/YLYe4mtTBfuj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a54d5dde85570834467b6a6cc849d5f8_JaffaCakes118
Files
-
a54d5dde85570834467b6a6cc849d5f8_JaffaCakes118.exe windows:4 windows x86 arch:x86
84d384ac1f5b1fb947e8800e8ca4f4ce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
GetModuleHandleA
GetStartupInfoA
gdi32
SetTextColor
StretchDIBits
CreateSolidBrush
GetMapMode
GetPaletteEntries
OffsetWindowOrgEx
SelectPalette
ExtSelectClipRgn
SetBrushOrgEx
SetStretchBltMode
msvcrt
__CxxFrameHandler
_ftol
_CxxThrowException
??2@YAPAXI@Z
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
__dllonexit
_onexit
??1type_info@@UAE@XZ
_controlfp
??3@YAXPAX@Z
_purecall
Sections
.text Size: 168KB - Virtual size: 167KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 592B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ