Static task
static1
Behavioral task
behavioral1
Sample
dd076153cbfcdf35dfd8d240d2c22ad0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd076153cbfcdf35dfd8d240d2c22ad0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dd076153cbfcdf35dfd8d240d2c22ad0_JaffaCakes118
-
Size
73KB
-
MD5
dd076153cbfcdf35dfd8d240d2c22ad0
-
SHA1
f888a6b9645bd9709950af47e1bd4e98a5e4b88d
-
SHA256
209ee97cac6f5700c4dd6d31add268b56132d5d046ccb77e899df2f077426ee9
-
SHA512
84e750a529c64fb21e5d5ac6b5a0cc56c623987bf2d61f871c4a80cb879bbd8524ec71679494a31bf0615f50ffcdf0f2f7d80234253c8d054134a94a6a6e2101
-
SSDEEP
1536:ndqXqzNWxDSLifOMgnsbupxq5eKaem/EmFyUi:ns6NqYimZQuTqkM2EmFyUi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dd076153cbfcdf35dfd8d240d2c22ad0_JaffaCakes118
Files
-
dd076153cbfcdf35dfd8d240d2c22ad0_JaffaCakes118.exe windows:5 windows x86 arch:x86
adc4bdbe4676dd11d5d8a43622b30ebb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
PtVisible
CreatePen
CreateBitmapIndirect
SetBkColor
GetCurrentObject
EndPath
IntersectClipRect
GetRgnBox
kernel32
FileTimeToDosDateTime
IsBadReadPtr
MulDiv
GetCPInfo
WaitForSingleObjectEx
MultiByteToWideChar
AddAtomA
GlobalFindAtomW
CreatePipe
GetTempFileNameA
SetHandleInformation
TransactNamedPipe
IsBadStringPtrW
user32
MapVirtualKeyExW
GetPropW
CallWindowProcA
CharToOemBuffA
SetLastErrorEx
FindWindowExA
DeleteMenu
ExitWindowsEx
TranslateMessage
GetScrollRange
CopyRect
DrawFocusRect
comctl32
ImageList_AddMasked
CreatePropertySheetPageA
ImageList_Read
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tlc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ