Static task
static1
Behavioral task
behavioral1
Sample
b82615c06ad9ec7cae2a17dc87552a64_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b82615c06ad9ec7cae2a17dc87552a64_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b82615c06ad9ec7cae2a17dc87552a64_JaffaCakes118
-
Size
50KB
-
MD5
b82615c06ad9ec7cae2a17dc87552a64
-
SHA1
d2b013f17c54195e09e958e2c2488365ddbf39a9
-
SHA256
a68e28394f5bdca1bf764a44c9f05f6197cbbee95bfecb1e15a575f32f3b69e9
-
SHA512
ff5c70b54be325a7bbad4e9d40222a1d05043a2879cefd87f6623d8592df259a70e88b577aca379bc8ccf416c2771642c751ceb263381303efcaa3fa9de9b058
-
SSDEEP
768:8gCoOJSfO33OMspLXLuAA/9JSRgqwqbK7AG3BtpL+63L3S333DtevsjdxClTkX:LCFgO3DspbSKRgqwqbKXBv+PUv2bmAX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b82615c06ad9ec7cae2a17dc87552a64_JaffaCakes118
Files
-
b82615c06ad9ec7cae2a17dc87552a64_JaffaCakes118.exe windows:4 windows x86 arch:x86
c27d626ce9a140dab3be0b42ec5087ae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
comctl32
InitCommonControls
comdlg32
GetOpenFileNameA
gdi32
CreateFontIndirectA
CreateSolidBrush
DeleteObject
GetDeviceCaps
SelectObject
SetBkMode
SetTextColor
TextOutA
kernel32
AddAtomA
AllocConsole
CloseHandle
CreateProcessA
CreateThread
ExitProcess
FindAtomA
FindClose
FindFirstFileA
FormatMessageA
FreeConsole
GetAtomNameA
GetConsoleMode
GetConsoleTitleA
GetExitCodeProcess
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetShortPathNameA
GetStartupInfoA
GetStdHandle
GetVersionExA
LocalFree
MulDiv
PeekConsoleInputA
ReadConsoleInputA
ReadConsoleOutputCharacterA
SetConsoleCtrlHandler
SetConsoleMode
SetConsoleTitleA
SetErrorMode
SetUnhandledExceptionFilter
Sleep
WriteConsoleInputA
WritePrivateProfileStringA
msvcrt
__getmainargs
__mb_cur_max
__p___argc
__p___argv
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_controlfp
_fileno
_iob
_isctype
_onexit
_pctype
_setmode
abort
atexit
atoi
exit
free
malloc
memset
pow
signal
sprintf
strcat
strcpy
strlen
strncpy
strrchr
tolower
toupper
shell32
DragFinish
DragQueryFileA
user32
BeginPaint
CreateDialogParamA
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
EnableWindow
EndPaint
FindWindowA
GetClientRect
GetDC
GetDlgItem
GetMessageA
GetSystemMetrics
GetWindowRect
GetWindowTextA
InvalidateRect
LoadCursorA
LoadIconA
LoadStringA
MapVirtualKeyA
MessageBoxA
MoveWindow
PostMessageA
PostQuitMessage
RegisterClassExA
ReleaseDC
SendMessageA
SetWindowPos
SetWindowTextA
ShowWindow
SystemParametersInfoA
TranslateMessage
VkKeyScanA
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 43KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE