Static task
static1
Behavioral task
behavioral1
Sample
b062bcce4e614efb15e014c291ea4a54_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b062bcce4e614efb15e014c291ea4a54_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b062bcce4e614efb15e014c291ea4a54_JaffaCakes118
-
Size
30KB
-
MD5
b062bcce4e614efb15e014c291ea4a54
-
SHA1
0d7a229f3675e087c869d61bb74878920b97cd82
-
SHA256
e10b035392800e604e589ceab79939fad09494e3a9f96ff732ecc051a64570e0
-
SHA512
bcebe1161e8ed857dab1dd7457ac59f76668588736c8fe1dcff1db72e652399699075f3e278bef83407e3c1591ac0ddc68dcbd153820fa13b3f9abef45d7fd0a
-
SSDEEP
384:9aLa54Q0c6naELE8+uHaEBjGvPqz010lEaAmqNrgCmbgfDpDz9t5m:k2fF2aELE8TjyPW01UEeBCCgfDxo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b062bcce4e614efb15e014c291ea4a54_JaffaCakes118
Files
-
b062bcce4e614efb15e014c291ea4a54_JaffaCakes118.exe windows:1 windows x86 arch:x86
a7add1f2929975ef98ba18acb8fcf5c1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
user32
DispatchMessageA
TranslateMessage
GetDlgItem
EndDialog
DefWindowProcA
LoadIconA
IsDialogMessageA
GetDlgItemTextA
GetCursor
FillRect
MessageBeep
DialogBoxParamA
CreateDialogParamA
CharUpperA
SendDlgItemMessageA
LoadCursorA
GetSysColorBrush
GetMessageA
SetCursor
GetDC
SetWindowTextA
GetClientRect
SetDlgItemTextA
PostQuitMessage
RegisterClassExA
ReleaseDC
SetWindowLongA
MessageBoxA
SetWindowPos
CheckDlgButton
wsprintfA
kernel32
CopyFileA
SetFileAttributesA
SetCurrentDirectoryA
GetDriveTypeA
ReadFile
GetCurrentDirectoryA
GetModuleHandleA
ExitProcess
GetLogicalDriveStringsA
lstrcmp
WriteFile
GetFileTime
SetUnhandledExceptionFilter
SetLastError
GetFileSize
SetFileTime
CloseHandle
GetFileAttributesA
SetFilePointer
CreateFileA
gdi32
TextOutA
SetTextColor
SetBkMode
SelectObject
GetStockObject
GetObjectA
CreateFontIndirectA
shell32
SHBrowseForFolder
DragQueryFile
DragAcceptFiles
ShellExecuteA
SHGetPathFromIDList
SHGetMalloc
imagehlp
SearchTreeForFile
Sections
CODE Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.PATCH Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE