Static task
static1
Behavioral task
behavioral1
Sample
ac599a8ede7aade68afc9bf14cf39b57_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ac599a8ede7aade68afc9bf14cf39b57_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ac599a8ede7aade68afc9bf14cf39b57_JaffaCakes118
-
Size
260KB
-
MD5
ac599a8ede7aade68afc9bf14cf39b57
-
SHA1
e952d9102aebe22ed2134439734760e3559a21ac
-
SHA256
39270bb62149ab49e8a5e428d35221920181ef57e5ba614200892d3502b1cc9c
-
SHA512
010b4d63b89d0d48b0bb848b25ed21992fa804942c28f2953a5b20dc61329112b5dc0374a78f4ce1dfa8d2b134a70d1fc5e0a2a162ca92d7e1ee4f8fb649a124
-
SSDEEP
3072:riY3xOGj/yT2GahLpLnifPdJlTNw3X8c7l9B/UxjeDeWkrNy3vKUYEJctssA:Rf/24LpLnepw3X8c7uaePpw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac599a8ede7aade68afc9bf14cf39b57_JaffaCakes118
Files
-
ac599a8ede7aade68afc9bf14cf39b57_JaffaCakes118.exe windows:4 windows x86 arch:x86
90f0a6e29949a976ae65095739dfff22
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControls
gdi32
RestoreDC
EndPath
SelectPalette
SetMapMode
SetBrushOrgEx
SetWindowExtEx
SetBkColor
GetDIBColorTable
MoveToEx
SetTextColor
EndDoc
GetTextMetricsA
GetDCOrgEx
GetStockObject
SetColorSpace
SetBkMode
BeginPath
user32
GetInputState
CharNextA
GetDesktopWindow
GetMessagePos
kernel32
lstrcmpA
GetCurrentThread
GetThreadLocale
lstrlenA
MulDiv
GetLastError
VirtualAlloc
SetCurrentDirectoryA
RemoveDirectoryA
GetOEMCP
lstrcmpiW
GlobalFindAtomA
CopyFileA
IsDebuggerPresent
GetCommandLineW
GetProcessHeap
GetCurrentProcess
GlobalFindAtomW
SetLastError
GetCurrentThreadId
GetConsoleOutputCP
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ