Static task
static1
Behavioral task
behavioral1
Sample
e074bcbd64803c90ae7d24dd3ac62146_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e074bcbd64803c90ae7d24dd3ac62146_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e074bcbd64803c90ae7d24dd3ac62146_JaffaCakes118
-
Size
115KB
-
MD5
e074bcbd64803c90ae7d24dd3ac62146
-
SHA1
c79fd4fefc808167b000f2963ca03265846e18c3
-
SHA256
5a8d2617e2125445938b1a95332e4b9fa603b8899f68e5eba3949d5709b17502
-
SHA512
544d33b8e7e48635057c0900786c11775e5fa6840fa1edb6ae1b28d2c0eed1c7a743edb62f8eb59f3521f8030c4587195715986eb360a6406afe83d30f9cfd45
-
SSDEEP
1536:SSkr5y9KnLn4xpiBxDJL688tvpu4+iWw0GCy/MXUPI5MvlpF+rGREX+sjXPN7Cr:e5NLkiBT688NB+ioGlhvsPjXPN2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e074bcbd64803c90ae7d24dd3ac62146_JaffaCakes118
Files
-
e074bcbd64803c90ae7d24dd3ac62146_JaffaCakes118.exe windows:4 windows x86 arch:x86
8cd1df2fe982f29f2bfe07c568ad1dc7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetTextAlign
CreatePalette
SetMapMode
DeleteDC
CreateCompatibleDC
RectVisible
GetDeviceCaps
RestoreDC
SetStretchBltMode
SelectPalette
GetClipBox
LineTo
CreateSolidBrush
GetStockObject
GetPixel
GetObjectA
SaveDC
CreateFontIndirectA
DeleteObject
SelectObject
SetTextColor
kernel32
GetWindowsDirectoryA
QueryPerformanceCounter
lstrlenW
GetModuleHandleA
GlobalFindAtomA
lstrcmpA
CopyFileA
lstrlenA
GetSystemTime
RemoveDirectoryA
lstrcmpiW
lstrcmpiA
GetCommandLineA
DeleteFileA
RemoveDirectoryW
FindClose
VirtualAlloc
VirtualFree
user32
GetDesktopWindow
CharNextA
TranslateMessage
GetParent
GetSystemMetrics
GetDC
glu32
gluNurbsCallback
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ