Static task
static1
Behavioral task
behavioral1
Sample
b2f4070b984f8434eb6dcdeac45ec554_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b2f4070b984f8434eb6dcdeac45ec554_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b2f4070b984f8434eb6dcdeac45ec554_JaffaCakes118
-
Size
39KB
-
MD5
b2f4070b984f8434eb6dcdeac45ec554
-
SHA1
64235afa632211d453001aa36b5f12279b2d9a82
-
SHA256
9fbd530da858cd2fb6aee8256767da40f47c066381d3a7a40236c269849090e6
-
SHA512
8b3314d97d056916dce8f80aa20dd90d3822933573586885b6015e89fd53b7854279d1e90c7683b42562e3235f08035721276f594f295b495c919029a61415d5
-
SSDEEP
768:0kMlXDT2l+FCiXv/UdgQ/cjPKXAglBLLLLLLLLLLLLLLebAnWoqL+dddWA9Put:XMN3eyXIHEmwMLLLLLLLLLLLLLLTnW5e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b2f4070b984f8434eb6dcdeac45ec554_JaffaCakes118
Files
-
b2f4070b984f8434eb6dcdeac45ec554_JaffaCakes118.exe windows:4 windows x86 arch:x86
5d26d9b60f67f83d80fb9b2f5e114809
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
LoadLibraryA
GetProcAddress
CreateThread
GetTimeFormatA
Sleep
GetModuleHandleA
GetStartupInfoA
user32
DefWindowProcA
RegisterClassA
LoadCursorA
PostQuitMessage
DestroyWindow
GetWindowRect
LoadIconA
CreateWindowExA
SetDlgItemTextA
LoadImageA
ReleaseDC
GetDCEx
WaitMessage
DispatchMessageA
TranslateMessage
PeekMessageA
ShowWindow
SetFocus
GetSystemMetrics
UpdateWindow
gdi32
CreateCompatibleBitmap
CreateRectRgnIndirect
DeleteObject
GetStockObject
GetObjectA
msvcp60
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
??9std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
msvcrt
rand
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
memmove
memset
getenv
memcpy
??2@YAPAXI@Z
atoi
_except_handler3
sprintf
strlen
_controlfp
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ