URdvyrmBa@8
Static task
static1
Behavioral task
behavioral1
Sample
b7ada964b4e307434d2c2bd3600ffe19_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b7ada964b4e307434d2c2bd3600ffe19_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b7ada964b4e307434d2c2bd3600ffe19_JaffaCakes118
-
Size
100KB
-
MD5
b7ada964b4e307434d2c2bd3600ffe19
-
SHA1
35fdcf22865233e804b2b3569b6d8e7e956df3ba
-
SHA256
150f4e4609ad5b36891b948b29b1a2f7d0defc46fb146f5dc5b568b507c3c5d9
-
SHA512
8134973342acf120af0662838fbd517bd914af09bef062fda5852059f6bbaad8279bb781ce793f52978f64a24002a50b4dacac2d7f0d3a6382c884a8ef4d052d
-
SSDEEP
1536:g+ZxkiqzfcFDy95jCtt6fZGq3+mzwK5aB+yipX6vXgozR0B4m9:nx0zEFDejKIxGq3gKG+yGmgoV0GE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7ada964b4e307434d2c2bd3600ffe19_JaffaCakes118
Files
-
b7ada964b4e307434d2c2bd3600ffe19_JaffaCakes118.exe windows:4 windows x86 arch:x86
e954d35a261032719bfd4fb5e306cdf7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
lstrlenW
GetFileAttributesA
IsBadHugeReadPtr
ExitProcess
GetSystemDefaultLangID
LoadLibraryA
GetVersionExA
GetEnvironmentStrings
Sleep
HeapDestroy
LoadResource
GetOEMCP
GetUserDefaultLCID
MulDiv
SetFilePointer
VirtualAlloc
MoveFileA
GetStringTypeW
SizeofResource
GetStartupInfoA
LockResource
GetLastError
GetFullPathNameA
FindResourceA
shell32
DragQueryFileA
shlwapi
SHQueryInfoKeyA
SHGetValueA
user32
SetWindowLongA
IsDialogMessageA
GetKeyboardState
SetRect
CharNextW
OpenClipboard
SetWindowPlacement
PeekMessageA
DestroyMenu
IsZoomed
EqualRect
GetMessagePos
GetTopWindow
GetKeyState
ShowOwnedPopups
AdjustWindowRectEx
DefMDIChildProcA
GetDlgItem
GetWindowLongW
GetClientRect
IsCharUpperA
LoadCursorA
UnhookWindowsHookEx
SetMenuItemInfoA
IsChild
DispatchMessageA
GetScrollInfo
GetPropA
FrameRect
GetSubMenu
EndDialog
TrackPopupMenu
IsCharLowerA
RemovePropA
CreateMenu
WindowFromPoint
GetMenuItemInfoA
PostQuitMessage
GetMenuStringA
IntersectRect
FindWindowA
GetLastActivePopup
SetScrollPos
GetWindowLongA
SetFocus
GetCursor
GetSystemMenu
IsWindowUnicode
PeekMessageW
CallNextHookEx
GetWindowDC
MapWindowPoints
GetMenuItemCount
LoadKeyboardLayoutA
SetCapture
GetScrollRange
PostMessageA
CharUpperA
RegisterClassA
GetMenu
EnableMenuItem
InsertMenuA
SetWindowsHookExA
CloseClipboard
Exports
Exports
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.badata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ