Static task
static1
Behavioral task
behavioral1
Sample
b225c0dff1d601e80dd9ff7917ec5206_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b225c0dff1d601e80dd9ff7917ec5206_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b225c0dff1d601e80dd9ff7917ec5206_JaffaCakes118
-
Size
186KB
-
MD5
b225c0dff1d601e80dd9ff7917ec5206
-
SHA1
1b8d7f35fc8b57511cdd07ca368c639db33dc34a
-
SHA256
1f89d87086e93aa7122d9f1c61bb6e640f00d36e0c3921e6c4c568cfcfb9db0b
-
SHA512
c36d94296c7d43e5138e4a02373123fabc175c85e454a874277f2f4dfb0c1918a3cbbe940505447d5a999cd18a40e106e1c8f770425f91a561e461823a157c52
-
SSDEEP
3072:nDzLxSIfXMemsFfl29Jrmka3T08haiQgYmHzsCEiC5TobHYO5V1y:DzLxSIPdt+JKb3I8htjYmHTEnGzYO5V0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b225c0dff1d601e80dd9ff7917ec5206_JaffaCakes118
Files
-
b225c0dff1d601e80dd9ff7917ec5206_JaffaCakes118.exe windows:4 windows x86 arch:x86
aaaf6996320a1eae131b242882b608f1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
AdjustWindowRectEx
InvalidateRect
GetClientRect
PostMessageW
GetWindowPlacement
SetCursor
SetRectEmpty
FillRect
msvfw32
ICSendMessage
ICClose
ICOpen
ICDecompress
advapi32
RegCreateKeyW
RegQueryValueExW
RegCloseKey
RegSetValueExW
RegOpenKeyExW
RegDeleteKeyW
RegEnumKeyExW
RegSetValueW
kernel32
GetShortPathNameA
LoadLibraryW
UnhandledExceptionFilter
GetFileInformationByHandle
CreateFileW
GetProcAddress
CloseHandle
EnumResourceTypesW
GetCurrentThreadId
ExitProcess
GetLastError
GetCurrentProcessId
GetModuleHandleW
GlobalFree
GetVersionExW
Sections
.text Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 368KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ