Static task
static1
Behavioral task
behavioral1
Sample
fc9099f63413854996d890c4b9d30996_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc9099f63413854996d890c4b9d30996_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fc9099f63413854996d890c4b9d30996_JaffaCakes118
-
Size
112KB
-
MD5
fc9099f63413854996d890c4b9d30996
-
SHA1
a32a536eea39ecd41028c61423479aac5a966a3f
-
SHA256
0ac6cd0615c3919b0e6136f7ac4966b72a32d7235be7cc5bd4e6503127d28b91
-
SHA512
5b3de1e015093c56758681f2be86febc489a8517649b07de748e3e4eb00cea524dacbf4030e8437f9e29077b815c1342c530e314dfa0ab1d800154d4788918c1
-
SSDEEP
3072:4/6fFpiJwvyUfYePZmsvYQMfPElKdu6ljw3WeRE:9fFpuMyUfYsDfMqKdu6Jw3WeR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fc9099f63413854996d890c4b9d30996_JaffaCakes118
Files
-
fc9099f63413854996d890c4b9d30996_JaffaCakes118.exe windows:1 windows x86 arch:x86
dbcac4d4de2f384dd9f9afb290d27ef5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CompareFileTime
GetCommandLineA
GetDiskFreeSpaceA
GetExitCodeProcess
GetFileSize
GetLastError
GetModuleHandleA
GetProcAddress
GetTickCount
LoadLibraryA
SearchPathA
Sleep
SleepEx
UnmapViewOfFile
VirtualAlloc
VirtualFree
lstrcatA
lstrcmpA
lstrlenA
gdi32
CreateBrushIndirect
CreateFontIndirectA
DeleteObject
GetDeviceCaps
SetBkColor
SetTextColor
user32
AppendMenuA
EndDialog
EqualRect
FindWindowExA
GetMenu
GetMessagePos
InvalidateRect
IsCharUpperA
LoadCursorA
PostQuitMessage
ScreenToClient
SetCaretPos
TrackPopupMenuEx
Sections
.dhuh Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cxae Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.anhg Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rrtb Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ