Static task
static1
Behavioral task
behavioral1
Sample
b94fcf6692958e4c1641378a334d4f61_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b94fcf6692958e4c1641378a334d4f61_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b94fcf6692958e4c1641378a334d4f61_JaffaCakes118
-
Size
150KB
-
MD5
b94fcf6692958e4c1641378a334d4f61
-
SHA1
bf05c22e8c3d7a7bfb16ab3dd845619ac0e4aae6
-
SHA256
51dfcca95274b2c123375b10b6240ba2c026c3a15064ae669bb23ec9956626fe
-
SHA512
5deadb480c374a1a1f877f8b98fda3572fbb5c5c7ba3ec2650c54b1829f0bc03ce52dcc9f6386744c26a0b7cc38a0a55537688c4dd4477c968dc1b2477283a4f
-
SSDEEP
1536:I4v7gJk8u4rsy+PCAze7k1BePKHym1QbKYzmM+DJrTdzOE+c:1v7A3u4AeAaKB1Sm1QWYzmM6JrTdZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b94fcf6692958e4c1641378a334d4f61_JaffaCakes118
Files
-
b94fcf6692958e4c1641378a334d4f61_JaffaCakes118.exe windows:5 windows x86 arch:x86
330124fb5a1cfc60f9ded2959ac54b07
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpA
GetCurrentProcessId
lstrcmpiW
VirtualAlloc
GetCommandLineW
VirtualFree
GetThreadLocale
GetCommandLineA
DeleteFileA
GetDriveTypeA
GetVersion
lstrlenW
SetCurrentDirectoryA
GetLastError
gdi32
GetDeviceCaps
CreateSolidBrush
CreatePen
Rectangle
user32
TranslateMessage
GetDesktopWindow
GetSystemMetrics
GetDC
DispatchMessageA
glu32
gluTessCallback
comctl32
InitCommonControls
Sections
.text Size: 1024B - Virtual size: 868B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Dhiauuxh Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ