Static task
static1
Behavioral task
behavioral1
Sample
f67643f994883991158cea7d5fabd80a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f67643f994883991158cea7d5fabd80a_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
f67643f994883991158cea7d5fabd80a_JaffaCakes118
-
Size
67KB
-
MD5
f67643f994883991158cea7d5fabd80a
-
SHA1
350904194abbd220e07a83a8f66d9d2c5a786cc6
-
SHA256
2d9be94ed75f7e2b20526079627c5dd473c156f3c90cfd55fb613cb9af000d81
-
SHA512
135585dace3465220b3d3dacf5e672299b490c45e5aab49bdc8a1745357becd80952a0df40bd7e6098838608e24cba57dad370dea11a0c531a9c969ef0c46b04
-
SSDEEP
1536:eT2bAWQ13AXczSrMtJoAS0figPocdddddddd:eSb5XpJAS0fFPo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f67643f994883991158cea7d5fabd80a_JaffaCakes118
Files
-
f67643f994883991158cea7d5fabd80a_JaffaCakes118.exe windows:5 windows x86 arch:x86
2b366d0df1a8bd56912dbbf332662e60
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DispatchMessageA
TranslateMessage
GetDesktopWindow
GetDC
ShowWindow
GetParent
gdi32
GetDeviceCaps
SelectObject
DeleteObject
SelectPalette
DeleteDC
CreateFontIndirectA
SetBkMode
SetTextColor
SetMapMode
LineTo
kernel32
GetWindowsDirectoryA
GetLastError
IsDebuggerPresent
DeleteFileW
VirtualAlloc
lstrlenA
GetProcessHeap
GetCommandLineW
GetCurrentThread
GetCommandLineA
VirtualFree
glu32
gluTessCallback
comctl32
InitCommonControls
Sections
.text Size: 1024B - Virtual size: 942B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Pudpba P Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ