2b05hDr
Static task
static1
Behavioral task
behavioral1
Sample
b8e6cbdb121d05957cffaa6c19eae1b0_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b8e6cbdb121d05957cffaa6c19eae1b0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b8e6cbdb121d05957cffaa6c19eae1b0_JaffaCakes118
-
Size
80KB
-
MD5
b8e6cbdb121d05957cffaa6c19eae1b0
-
SHA1
7727503b40be0c4820ca48cb37b67bcf4514d917
-
SHA256
94b12a9c0343a27f0abe919d1ab57fd82d26f356d06229593b7e221e283b06ff
-
SHA512
474721fdbcb4e9fe193574816e8d5321b9fa9d4219b7df6a78295d7fca6360bb4358779cd15cc5d98abdca80e36e8389b749822f77e78df27b8514944aa38a52
-
SSDEEP
768:SJ0tN2UBeuvXmsPFJU8/xe83sFvg2yRumI9l3TY4VNPzfWmYjvBuQ3cNc7mph4RF:SYFJtxe832go9hTYwPJkb3ctqRk44ml
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b8e6cbdb121d05957cffaa6c19eae1b0_JaffaCakes118
Files
-
b8e6cbdb121d05957cffaa6c19eae1b0_JaffaCakes118.exe windows:4 windows x86 arch:x86
e15ea4be822f7ac7f2e1898e47bd6b50
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetKeyboardType
GetKeyboardLayoutNameA
LoadIconA
CharLowerA
SetWindowTextA
SetWindowLongA
GetWindow
EnableWindow
GetSystemMetrics
DrawEdge
IsWindowVisible
IsIconic
DrawMenuBar
EmptyClipboard
OpenClipboard
ReleaseCapture
CharNextW
RemovePropA
InflateRect
GetMenuItemCount
LoadCursorA
RegisterClassA
DrawTextA
FrameRect
SetWindowPlacement
MessageBeep
IsDialogMessageW
GetClassLongA
ClientToScreen
GetKeyboardState
IsCharUpperA
GetMenu
GetDC
GetKeyState
IsDlgButtonChecked
GetMenuItemID
EqualRect
RegisterClipboardFormatA
SystemParametersInfoA
IsWindow
GetForegroundWindow
LoadKeyboardLayoutA
AdjustWindowRectEx
PeekMessageW
UnregisterClassA
ShowWindow
DrawIconEx
LoadStringA
SetWindowLongW
DrawAnimatedRects
DefFrameProcA
GetWindowTextLengthA
CallNextHookEx
GetCapture
GetParent
GetSubMenu
KillTimer
CheckMenuItem
GetPropA
GetClientRect
SetClipboardData
DestroyWindow
oleaut32
SafeArrayGetElement
SafeArrayGetUBound
OleLoadPicture
SysReAllocStringLen
SafeArrayPtrOfIndex
gdi32
GetBkColor
kernel32
FormatMessageA
ResetEvent
GetUserDefaultLCID
ExitProcess
FindFirstFileA
HeapDestroy
GetVersionExA
GetStdHandle
CompareStringA
GlobalDeleteAtom
LoadLibraryA
Sleep
InitializeCriticalSection
GetCurrentThreadId
GetFileSize
SetFilePointer
GetEnvironmentStrings
FreeResource
SetHandleCount
GetVersion
GlobalAddAtomA
VirtualAllocEx
GetTickCount
SetErrorMode
GlobalAlloc
Exports
Exports
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 841B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.badata Size: 512B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ