Static task
static1
Behavioral task
behavioral1
Sample
ad95ea61c536881af0f11d2dc576a517_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ad95ea61c536881af0f11d2dc576a517_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ad95ea61c536881af0f11d2dc576a517_JaffaCakes118
-
Size
26KB
-
MD5
ad95ea61c536881af0f11d2dc576a517
-
SHA1
c75232b53fd4d7c6282a1df3682f44bdf854b01b
-
SHA256
e41ce1d118700b824b16c2a561fc4b8b3039459a342a01e29647f51d5f276995
-
SHA512
2777074a8190e3978bd53f6088cbe91fc446d08e63578112f1f272a02e0d8ba593c21a6dbe43effd127d4154d4b62a05cb728a072ed1e736202804713fc1bf75
-
SSDEEP
384:JjcccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccT:Jo7UTyiWyol70+rl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad95ea61c536881af0f11d2dc576a517_JaffaCakes118
Files
-
ad95ea61c536881af0f11d2dc576a517_JaffaCakes118.exe windows:4 windows x86 arch:x86
3269e2e0b0f573e8814ac2711f362442
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
CloseHandle
GetModuleHandleA
GetStdHandle
gdi32
PatBlt
DeleteObject
LineTo
ExtTextOutA
GetPixel
SelectObject
SetBkMode
CreateSolidBrush
SetPixel
GetObjectA
GetStockObject
CreateFontIndirectA
GetDeviceCaps
SetROP2
GetTextMetricsA
MoveToEx
GetTextColor
GetBkColor
user32
GetMessageA
CreateWindowExA
EndPaint
LoadIconA
GetWindowRect
DialogBoxParamA
SetWindowTextA
GetSysColor
PostQuitMessage
EndDialog
ScreenToClient
SetFocus
GetFocus
DispatchMessageA
TranslateMessage
DestroyWindow
MessageBoxA
ShowWindow
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ