Static task
static1
Behavioral task
behavioral1
Sample
d4632ef6010910625864d4a775f1e010_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4632ef6010910625864d4a775f1e010_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4632ef6010910625864d4a775f1e010_JaffaCakes118
-
Size
110KB
-
MD5
d4632ef6010910625864d4a775f1e010
-
SHA1
9cf87318c132ba8ab721d1d3ec6a766e9e883652
-
SHA256
c9edaa4023ff0f95681dca5fa04c2805f064f0d57b347cdea52cf97ee49296d0
-
SHA512
5992474a072b36e73622d1256a99727cbb8fc29b25429cc5af1647c6f052dd28ed25ea21433262d6949d351630bd9772182472145a5e2d35baa7175aaaf4c274
-
SSDEEP
1536:Smo8RnzkUmgNo17ONrImdqurNVjpxDIOSTVtB9OEt0p2U+HrUPZ55j94+3iXB5nx:NNzkUG1xmdrNlpiOgbUQ3fpky
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4632ef6010910625864d4a775f1e010_JaffaCakes118
Files
-
d4632ef6010910625864d4a775f1e010_JaffaCakes118.exe windows:5 windows x86 arch:x86
0fa87befe04624fcbbf307c26a284f2a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetTextAlign
RectVisible
GetObjectA
SetStretchBltMode
SelectPalette
GetDeviceCaps
CreateFontIndirectA
DeleteObject
GetStockObject
GetClipBox
SaveDC
SetTextColor
LineTo
CreatePalette
SetMapMode
DeleteDC
CreateSolidBrush
CreateCompatibleDC
GetPixel
GetTextMetricsA
SelectObject
kernel32
QueryPerformanceCounter
RemoveDirectoryA
GetCommandLineA
lstrlenW
GetModuleHandleA
DeleteFileA
CopyFileA
lstrcmpA
lstrcmpiW
GlobalFindAtomA
lstrlenA
VirtualAlloc
GetSystemTime
GetWindowsDirectoryA
VirtualFree
lstrcmpiA
RemoveDirectoryW
FindClose
user32
GetSystemMetrics
TranslateMessage
CharNextA
GetDesktopWindow
GetDC
GetParent
glu32
gluNurbsCallback
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ