Static task
static1
Behavioral task
behavioral1
Sample
0703812b8cb1e7ca728c06ec9ead30d3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0703812b8cb1e7ca728c06ec9ead30d3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0703812b8cb1e7ca728c06ec9ead30d3_JaffaCakes118
-
Size
109KB
-
MD5
0703812b8cb1e7ca728c06ec9ead30d3
-
SHA1
a867226238419bffc89259cc207205cbb1b1c8bd
-
SHA256
a71f37ff5395a001cd9c3b8f5fe4f2b031f40f2520c9920a6dfe6206faf2ee31
-
SHA512
92c949f5c1d25eb7cb4229dca1da7114583d75e6329f1d56c589cee69e3082602486e1734f622ccbac97291609c3133e9015afb6985bb9298e20d1e25c21e2fa
-
SSDEEP
1536:/d2OCZp7ZTA5Xh5Tn9syZb6KYfBcrXPINmEHbLydu06J/qYqcPisA/is3nYFd:/DGplefD9smhYfurwNmEyTmHqJ3nYFd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0703812b8cb1e7ca728c06ec9ead30d3_JaffaCakes118
Files
-
0703812b8cb1e7ca728c06ec9ead30d3_JaffaCakes118.exe windows:4 windows x86 arch:x86
4e1d129fe9a4ffb2af2a9f70bacc04c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDC
TranslateMessage
GetSystemMetrics
CharNextA
GetParent
GetDesktopWindow
gdi32
RestoreDC
CreateFontIndirectA
DeleteDC
SetTextAlign
DeleteObject
SetMapMode
GetTextMetricsA
LineTo
GetDeviceCaps
GetObjectA
RectVisible
SetStretchBltMode
CreateSolidBrush
GetClipBox
CreatePalette
CreateCompatibleDC
SetTextColor
GetStockObject
SaveDC
GetPixel
SelectPalette
kernel32
lstrlenW
GetModuleHandleA
CopyFileA
GlobalFindAtomA
lstrcmpiW
QueryPerformanceCounter
GetSystemTime
RemoveDirectoryW
FindClose
lstrlenA
DeleteFileA
GetCommandLineA
GetWindowsDirectoryA
RemoveDirectoryA
lstrcmpA
lstrcmpiA
VirtualAlloc
VirtualFree
glu32
gluNurbsCallback
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE