Static task
static1
Behavioral task
behavioral1
Sample
d6a1d527a80c7b710ca7940970ebf038_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d6a1d527a80c7b710ca7940970ebf038_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d6a1d527a80c7b710ca7940970ebf038_JaffaCakes118
-
Size
25KB
-
MD5
d6a1d527a80c7b710ca7940970ebf038
-
SHA1
a189bb136d8903843626d65fe38bc8a0093be56e
-
SHA256
b2dfc70f6928a0c5ee655048c00a7eeeb5448426deb84080f1dc74ababf67ece
-
SHA512
1d2dd6338d51ac07a9038a739fdd3d34719c04b68ddac8afccd58a5db31527e802b73526656dfe48f27a9e45cde4c148b346955c43f6dba6dd5e1722bb52fc7f
-
SSDEEP
384:RTrjxgfNsOagjMxrdxnikiIIUX7mTNc1GgZK6yLBmoxeQO84/1Bd:RNgBaaMxr2TcSTNCnZK64BmoxbOf9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d6a1d527a80c7b710ca7940970ebf038_JaffaCakes118
Files
-
d6a1d527a80c7b710ca7940970ebf038_JaffaCakes118.exe windows:4 windows x86 arch:x86
62f91d509461daa9da6ff7b6e7dd11b6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
NtFindAtom
gdi32
SetBkMode
DeleteObject
ExtTextOutW
PatBlt
IntersectClipRect
DeleteDC
BitBlt
SelectObject
CreateDIBitmap
SetTextColor
CreateCompatibleDC
GetTextExtentPointW
SetBkColor
GetDeviceCaps
CreateSolidBrush
adsldpc
ADsFreeColumn
user32
GetDC
CallWindowProcW
EndPaint
OffsetRect
SendMessageW
SetWindowLongW
HideCaret
BeginPaint
ClientToScreen
GetWindowLongW
MessageBoxA
GetWindowDC
UnhookWindowsHookEx
DrawFocusRect
IsWindowEnabled
CharPrevW
DefWindowProcW
GetClientRect
SetWindowLongA
IntersectRect
SetWindowsHookExW
ExcludeUpdateRgn
IsIconic
GetFocus
GetSysColor
GetWindowTextLengthW
CallNextHookEx
InflateRect
DefDlgProcW
GetParent
GetWindow
SetPropW
GetPropW
DrawTextW
InvalidateRect
MapWindowPoints
ReleaseDC
ShowCaret
GetWindowTextW
ScreenToClient
ValidateRect
RemovePropW
GetClassInfoW
GetClassNameW
GetWindowRect
IsWindowUnicode
GetSystemMetrics
CharNextW
kernel32
GetProfileStringW
GlobalAlloc
GetEnvironmentVariableW
GetProcAddress
LoadResource
LeaveCriticalSection
InitializeCriticalSection
GetSystemDirectoryW
GetCurrentThreadId
lstrlenW
GetModuleFileNameW
VirtualAlloc
lstrcmpW
GlobalAddAtomW
GlobalFree
SizeofResource
GetModuleHandleA
GlobalDeleteAtom
GetVersion
GetWindowsDirectoryW
EnterCriticalSection
FindResourceW
ws2_32
WSAGetLastError
Sections
.textbss Size: - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 444B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 216B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.idata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE