Static task
static1
Behavioral task
behavioral1
Sample
00996635673d6b199facbd25fa114f2f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00996635673d6b199facbd25fa114f2f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
00996635673d6b199facbd25fa114f2f_JaffaCakes118
-
Size
108KB
-
MD5
00996635673d6b199facbd25fa114f2f
-
SHA1
fb9584aa22d03bdc33e771cde2acb2cc235a3dd0
-
SHA256
c0d41fabd21253fa9ef6af53f37b109eaeb6275b80e0890a40bd6db7968e3dfc
-
SHA512
eabfe9a0cd7562704caa3bebad071866338837ddf84130218836023de41aa8fafd07c81e78365fe47b072e6e1803fc5888778a11ef14584fbdfdd2cb65f67683
-
SSDEEP
1536:Syq6Bvp9Lzl/Ft53Zf7BbnjhbUJh3/lpt95v5//HBvh3Lf1znNRLLdfBH4:SuBB9/Zp3ZzJnG/lj95v5///prLdfC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00996635673d6b199facbd25fa114f2f_JaffaCakes118
Files
-
00996635673d6b199facbd25fa114f2f_JaffaCakes118.exe windows:4 windows x86 arch:x86
ff82262ff296e5c0b74e3d1be77c4e26
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpW
GetProcessHeap
GetFileTime
CreateDirectoryA
GetFileAttributesA
CompareStringW
GetLongPathNameA
VirtualAlloc
HeapCreate
GetAtomNameA
user32
SetDlgItemTextA
IsWindow
MessageBoxIndirectA
UpdateWindow
SetScrollPos
GetMenuItemCount
CharNextA
GetMenu
GetTopWindow
gdi32
CreateDIBSection
CreateEllipticRgn
SetTextColor
advapi32
RegQueryValueA
RegCreateKeyExA
comdlg32
FindTextW
PrintDlgExA
ChooseFontA
GetSaveFileNameA
shell32
ShellExecuteEx
ole32
CLSIDFromString
CoFileTimeNow
CoInitialize
version
VerInstallFileW
VerInstallFileA
VerLanguageNameW
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ