Static task
static1
Behavioral task
behavioral1
Sample
ce1e8fc7b5954c3364876d4150de8813_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce1e8fc7b5954c3364876d4150de8813_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ce1e8fc7b5954c3364876d4150de8813_JaffaCakes118
-
Size
128KB
-
MD5
ce1e8fc7b5954c3364876d4150de8813
-
SHA1
bf805fc2a38bb6eebc393d74fc80bb2c77be777b
-
SHA256
98a565a40f4dc7be27af7b8ea6f489c1ee0db7ef80aaa9e3126526ed339af24b
-
SHA512
f7c5836c1ce5f651eaa7537652c78938f33cf8ee390ebeeb4f15c07d3400948455c6713e9afb088173125ed0ffa20898df6ae2825f311026943246d9277952ba
-
SSDEEP
3072:k4Mjo5dq8M3WSnJi9EUeRKm78QOvamymM8:krjodmWSJAE/0mJmymT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ce1e8fc7b5954c3364876d4150de8813_JaffaCakes118
Files
-
ce1e8fc7b5954c3364876d4150de8813_JaffaCakes118.exe windows:1 windows x86 arch:x86
2769117e90ad85d2a8f9f5e57c3c8510
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_XcptFilter
_acmdln
__setusermatherr
_controlfp
__p__commode
__p__fmode
__set_app_type
_except_handler3
__getmainargs
_initterm
memcpy
exit
_exit
_adjust_fdiv
gdi32
RestoreDC
GetStockObject
SetBkMode
kernel32
VirtualProtect
GetModuleHandleA
GetStartupInfoA
VirtualAlloc
VirtualFree
user32
IsZoomed
GetWindowThreadProcessId
InvalidateRgn
IsDlgButtonChecked
DrawMenuBar
SetClassLongA
LoadAcceleratorsA
wsprintfA
LoadMenuA
GetDoubleClickTime
RegisterWindowMessageA
CreateWindowExA
IntersectRect
FindWindowA
SetClipboardData
LoadCursorA
Sections
.text Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ