Static task
static1
Behavioral task
behavioral1
Sample
e9c6e2532e4f7900c17fac79beccd973_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e9c6e2532e4f7900c17fac79beccd973_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e9c6e2532e4f7900c17fac79beccd973_JaffaCakes118
-
Size
111KB
-
MD5
e9c6e2532e4f7900c17fac79beccd973
-
SHA1
a3b2970b54d7bb72314b68c3297ea741936f324e
-
SHA256
8a8e7665a0a181fb22384d76534249115fa40b83d788c3c802a5b7d5a285bdd1
-
SHA512
99cfef78bbae75d2152dcab7924d6c3997cf7f74187f1f0deadc63ac27fccad52409880eec774b98aa3d373f6911a8bd6306785d4dcea452f7f69e53e6172285
-
SSDEEP
3072:v5KYMGEVtWfM68zTg40GMb8/258jQzaE:v5KYrwtWfMFzT90GM4/+8jaa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e9c6e2532e4f7900c17fac79beccd973_JaffaCakes118
Files
-
e9c6e2532e4f7900c17fac79beccd973_JaffaCakes118.exe windows:1 windows x86 arch:x86
dbcac4d4de2f384dd9f9afb290d27ef5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CompareFileTime
GetCommandLineA
GetDiskFreeSpaceA
GetExitCodeProcess
GetFileSize
GetLastError
GetModuleHandleA
GetProcAddress
GetTickCount
LoadLibraryA
SearchPathA
Sleep
SleepEx
UnmapViewOfFile
VirtualAlloc
VirtualFree
lstrcatA
lstrcmpA
lstrlenA
gdi32
CreateBrushIndirect
CreateFontIndirectA
DeleteObject
GetDeviceCaps
SetBkColor
SetTextColor
user32
AppendMenuA
EndDialog
EqualRect
FindWindowExA
GetMenu
GetMessagePos
InvalidateRect
IsCharUpperA
LoadCursorA
PostQuitMessage
ScreenToClient
SetCaretPos
TrackPopupMenuEx
Sections
.dgdf Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crth Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avsd Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rkuh Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ