Static task
static1
Behavioral task
behavioral1
Sample
eac10d2032c6277f487aef92c8b50b7b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac10d2032c6277f487aef92c8b50b7b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eac10d2032c6277f487aef92c8b50b7b_JaffaCakes118
-
Size
118KB
-
MD5
eac10d2032c6277f487aef92c8b50b7b
-
SHA1
511563d8e0e1213945fcaeb37af5c2b6d748edd8
-
SHA256
429c5aade1c604fff5394b2c0defd3da676d468c8647116b5dbfcde5aed89a03
-
SHA512
350078645bc3c61bc873c7c228cf417b137c4e4a61a60f24a8deeede954eeab094e4caf491c610403428ca41341c273afc5d711c6a8604aa9df7771f4e2b40a5
-
SSDEEP
1536:dhwOAUji9UFL+HFQIHOPU96GoKkQC6u9RMgLq6uJGPZ793N60YTNgtFc071:dhwOjjiUAQZFGVkQtKrPZ+gtFc07
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eac10d2032c6277f487aef92c8b50b7b_JaffaCakes118
Files
-
eac10d2032c6277f487aef92c8b50b7b_JaffaCakes118.exe windows:4 windows x86 arch:x86
0be653237dceeace7f44447e89f638ee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetSystemMetrics
CharNextA
TranslateMessage
GetDesktopWindow
GetParent
GetDC
gdi32
CreateSolidBrush
RectVisible
GetDeviceCaps
GetTextMetricsA
DeleteObject
SelectObject
SelectPalette
GetClipBox
GetPixel
SetTextAlign
SetTextColor
DeleteDC
RestoreDC
CreatePalette
GetObjectA
CreateCompatibleDC
CreateFontIndirectA
SaveDC
LineTo
kernel32
RemoveDirectoryW
lstrcmpiA
FindClose
GetWindowsDirectoryA
GetCommandLineA
lstrlenW
GlobalFindAtomA
lstrcmpiW
CopyFileA
GetModuleHandleA
lstrlenA
DeleteFileA
RemoveDirectoryA
lstrcmpA
QueryPerformanceCounter
VirtualAlloc
VirtualFree
GetSystemTime
glu32
gluNurbsCallback
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE