C:\Seek\Lost\Found\Include.exe
Static task
static1
Behavioral task
behavioral1
Sample
facda963b37dd9615ae80fa6cf6c39df_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
facda963b37dd9615ae80fa6cf6c39df_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
facda963b37dd9615ae80fa6cf6c39df_JaffaCakes118
-
Size
191KB
-
MD5
facda963b37dd9615ae80fa6cf6c39df
-
SHA1
ba9d46a223a7d222d328ff3688206334e69a076a
-
SHA256
5116bb651049cfe80a17089bdb1988aa00fb6f01fdb31faf7d84523d7dac8a90
-
SHA512
4b4f9bc79d2d77a1a88d808a249e8dd31293bb7d3928706d29444884d251336eb119fa2feb71b5de028e9660e78316ffb30f1c7fe29b7cb3e281176ed8bb68f4
-
SSDEEP
3072:jl62vHVhbgVOOT91xdFXc5AbJGAcpTqhbdVfmnmZSmGbFY:xNv1hUVlT91PFSAbpJHOnmZH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource facda963b37dd9615ae80fa6cf6c39df_JaffaCakes118
Files
-
facda963b37dd9615ae80fa6cf6c39df_JaffaCakes118.exe windows:5 windows x86 arch:x86
376594d5f36870a9684820c2ec861794
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
SetViewportOrgEx
CreateDIBitmap
GetTextMetricsA
SetBkMode
CreatePen
CreatePenIndirect
ExtFloodFill
CreatePolyPolygonRgn
RectVisible
GetTextFaceW
GetClipBox
user32
CharNextW
SetSysColors
GetKeyboardLayoutNameW
SendMessageTimeoutW
LoadMenuA
DestroyIcon
GetClassNameW
WindowFromPoint
GetKeyboardLayout
DefMDIChildProcA
IsCharUpperA
PtInRect
ScrollWindowEx
SetFocus
LoadMenuW
GetMenuStringW
LoadCursorA
ShowWindow
SendMessageA
ArrangeIconicWindows
GetActiveWindow
LoadCursorW
GetMenuItemID
SetScrollInfo
MessageBoxExW
kernel32
OpenEventW
FlushFileBuffers
SetWaitableTimer
GetSystemTimeAdjustment
LoadLibraryExW
GetOverlappedResult
GetPriorityClass
SetEvent
ole32
CoInitialize
Exports
Exports
_IsMenuIsMenuIsMenuIsMenuIsMenuIsMenuIsMenuIsMenuIsMenuIsMenuIsMenu@0WxMPwWAHfFFAYTmZ�B
Sections
.dbgdir Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.fggdf Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vptr1 Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wewew Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vbvbg Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ewerw Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ