Static task
static1
Behavioral task
behavioral1
Sample
db6f38874ed5483546990b87e6e23f30_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db6f38874ed5483546990b87e6e23f30_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
db6f38874ed5483546990b87e6e23f30_JaffaCakes118
-
Size
115KB
-
MD5
db6f38874ed5483546990b87e6e23f30
-
SHA1
7a483687de64c2f5a4d620283a4bc6dc1c057a50
-
SHA256
d2f2c5c41ada7af0ed2c5f00b697bd30f7c8370506f1f5f0a071c091e8c8c806
-
SHA512
fe9690946b93137785ea00d6ed704aa8432a408517109ab3a8f13d6f8dcd735d145067131e3d446255c2ceea2aab81437e324d861f8c9a374bb2e9616f8af8f5
-
SSDEEP
1536:aZcYT/kpJdPwoUqJ7XeCGoS/QN5Ue+CsX/ecjq3fYUS1NM3iiiLKD7btkc:eb/kpToqJDeCGo7S/ecytpD7btk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db6f38874ed5483546990b87e6e23f30_JaffaCakes118
Files
-
db6f38874ed5483546990b87e6e23f30_JaffaCakes118.exe windows:4 windows x86 arch:x86
71f067b3a119b1c364ff6a33308562db
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDesktopWindow
GetDC
GetSystemMetrics
CharNextA
TranslateMessage
GetParent
kernel32
GetModuleHandleA
GetSystemTime
lstrlenA
GetCommandLineA
lstrcmpiW
GetWindowsDirectoryA
GlobalFindAtomA
lstrcmpiA
QueryPerformanceCounter
DeleteFileA
CopyFileA
RemoveDirectoryW
FindClose
lstrlenW
RemoveDirectoryA
VirtualAlloc
lstrcmpA
VirtualFree
gdi32
GetClipBox
GetObjectA
DeleteObject
DeleteDC
SetMapMode
GetDeviceCaps
GetPixel
SetTextColor
SetStretchBltMode
SetTextAlign
RectVisible
LineTo
CreateSolidBrush
SaveDC
CreateFontIndirectA
RestoreDC
CreatePalette
SelectPalette
SelectObject
GetStockObject
CreateCompatibleDC
GetTextMetricsA
glu32
gluNurbsCallback
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ