Static task
static1
Behavioral task
behavioral1
Sample
d711d3aa4524cbaac1e3b60bc4aab6fa_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d711d3aa4524cbaac1e3b60bc4aab6fa_JaffaCakes118
-
Size
980KB
-
MD5
d711d3aa4524cbaac1e3b60bc4aab6fa
-
SHA1
c176533cb000792ef6f5c6b0aa67ab368517b463
-
SHA256
45ae19235106ab99afd6a528cc7877cfed881e66f1ead643656a836fddaebeef
-
SHA512
d5dec5896461546af95a8c08500485af1574ec3c3155e20107d7df643ddddc39b79086a16e743da7ce20688e564cddb5fa7f6d363ad290236007a5396b4a3227
-
SSDEEP
24576:OUlR3fKag6XnUTVFekO+Dp7lY6Sjq3pCS:OM3f5pKHO+D2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d711d3aa4524cbaac1e3b60bc4aab6fa_JaffaCakes118
Files
-
d711d3aa4524cbaac1e3b60bc4aab6fa_JaffaCakes118.exe windows:4 windows x86 arch:x86
ab22c1e8fe6360a5d6595cfe39577bc6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord4133
msvcrt
_strcmpi
kernel32
WriteFile
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
FillRect
MessageBoxA
gdi32
GetTextExtentPoint32A
advapi32
RegOpenKeyExA
shell32
ShellExecuteA
comctl32
_TrackMouseEvent
ole32
CoInitialize
olepro32
ord251
urlmon
URLDownloadToFileA
gdiplus
GdipDeleteGraphics
ws2_32
gethostbyname
msvcp60
??1_Winit@std@@QAE@XZ
shlwapi
PathFileExistsA
wininet
InternetOpenA
psapi
EnumProcesses
Sections
.text Size: - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xiaomi0 Size: - Virtual size: 170KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.xiaomi1 Size: 964KB - Virtual size: 963KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE