Static task
static1
Behavioral task
behavioral1
Sample
ba0762791136b23fba72d687a66ca091_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ba0762791136b23fba72d687a66ca091_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ba0762791136b23fba72d687a66ca091_JaffaCakes118
-
Size
149KB
-
MD5
ba0762791136b23fba72d687a66ca091
-
SHA1
441af99dcc278fd671854e357d624db88f905c43
-
SHA256
e1fe5b1dd65d07d09d917e964ef7abe0085a73f55414b2585e871201e98e9cd0
-
SHA512
0b7e00c6d996cc09b3055434f0d97e40cd6e6b85f4f0369607d868608cfe01d844da93ba83337e0df7705e290a7876bfd9f6e372c5bc9ba6fab4cedbfa0df643
-
SSDEEP
3072:N2FOQQy0LM20Z/CdP0hdaKmRaU2WVSMu2tuKw:ny8J0hdnm1S6tu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ba0762791136b23fba72d687a66ca091_JaffaCakes118
Files
-
ba0762791136b23fba72d687a66ca091_JaffaCakes118.exe windows:4 windows x86 arch:x86
67796d409ea0c45ff14af9403dddb8d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharNextA
GetDC
GetSystemMetrics
TranslateMessage
kernel32
VirtualAlloc
SetCurrentDirectoryA
GetCommandLineW
VirtualFree
QueryPerformanceCounter
GetOEMCP
lstrlenA
GetVersion
GetWindowsDirectoryA
lstrcmpA
gdi32
RestoreDC
SelectPalette
LineTo
CreateFontIndirectA
GetObjectA
SetTextAlign
glu32
gluTessCallback
comctl32
InitCommonControls
Sections
.text Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Tuiiimvh Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ