Static task
static1
Behavioral task
behavioral1
Sample
061d1eb485ee6c5d8c25e660463c321a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
061d1eb485ee6c5d8c25e660463c321a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
061d1eb485ee6c5d8c25e660463c321a_JaffaCakes118
-
Size
108KB
-
MD5
061d1eb485ee6c5d8c25e660463c321a
-
SHA1
d9e5d811905eb93a90339be2a63f193415d83b68
-
SHA256
afe9d6b86b275da65dec68a7f82778833949954bb8a69a8a4d214b5b58af7876
-
SHA512
45c872462e0863d6d521c7749dcef28f79a53ec2c4128e1b0635af04b2bb4f4aa682ff650ca0a3696164db65bd513d3ca36e4262a16e45a788fa5af0359e8905
-
SSDEEP
1536:BoDyOgyxojPzMIhLBdZzxdSgbyAzNiwPHZFDH5n2CyA39+J1IRoj6E7XOwgJj8E:BMyOxYblvZbjBpUCLcINwgJj8E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 061d1eb485ee6c5d8c25e660463c321a_JaffaCakes118
Files
-
061d1eb485ee6c5d8c25e660463c321a_JaffaCakes118.exe windows:4 windows x86 arch:x86
291a54fc337819d51d15dc18c84d8b04
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetStretchBltMode
GetObjectA
LineTo
SelectObject
SaveDC
SelectPalette
SetTextColor
CreatePalette
DeleteObject
GetDeviceCaps
CreateCompatibleDC
RestoreDC
SetMapMode
GetStockObject
CreateSolidBrush
SetTextAlign
DeleteDC
CreateFontIndirectA
GetTextMetricsA
RectVisible
GetPixel
kernel32
DeleteFileA
GetWindowsDirectoryA
lstrlenW
GetCommandLineA
VirtualAlloc
GetModuleHandleA
GlobalFindAtomA
lstrcmpiW
RemoveDirectoryA
VirtualFree
lstrcmpiA
lstrlenA
CopyFileA
GetSystemTime
QueryPerformanceCounter
RemoveDirectoryW
FindClose
lstrcmpA
user32
GetSystemMetrics
GetDesktopWindow
GetDC
TranslateMessage
CharNextA
GetParent
glu32
gluNurbsCallback
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ