Static task
static1
Behavioral task
behavioral1
Sample
d0bf84954350aa1b4ddc317e0e8c9312_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0bf84954350aa1b4ddc317e0e8c9312_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d0bf84954350aa1b4ddc317e0e8c9312_JaffaCakes118
-
Size
150KB
-
MD5
d0bf84954350aa1b4ddc317e0e8c9312
-
SHA1
93544e9870b8b260ca0b9ab3f45b38c95072cbab
-
SHA256
d94dc87d4b88c1fcd45d0e3a228a5e361c5fa16bb58dea42420c2fb0d0e00bad
-
SHA512
5c451cca985b5483f876107ed9c8d2e1f525e427f013f10682457106857b2502f5c30fb1989bd1a1c15b86881b2114b3918cf7b1e6111ee0ae6b104503afeda7
-
SSDEEP
1536:Wvq49czsHZ/4WMFekHCCUwKoYFG782KkEOxDCSdFIPS1B7UOktjr+54:lhzstRkJUwrIG78iEO1pqPOuOkt25
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d0bf84954350aa1b4ddc317e0e8c9312_JaffaCakes118
Files
-
d0bf84954350aa1b4ddc317e0e8c9312_JaffaCakes118.exe windows:5 windows x86 arch:x86
08da26d4515324e9e28e03208e7ed157
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetParent
CharNextA
TranslateMessage
GetSystemMetrics
GetDesktopWindow
GetDC
kernel32
VirtualAlloc
DeleteFileA
GetUserDefaultLangID
lstrcmpA
GetOEMCP
GetModuleHandleW
VirtualFree
lstrlenW
GetWindowsDirectoryA
MulDiv
GetCurrentProcessId
gdi32
GetDeviceCaps
CreatePalette
LineTo
DeleteDC
CreateSolidBrush
SetTextAlign
glu32
gluTessCallback
comctl32
InitCommonControls
Sections
.text Size: 1024B - Virtual size: 941B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Ibvogogr Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ