Static task
static1
Behavioral task
behavioral1
Sample
0c92ecdea548609c23ca38089d9ac9ac_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c92ecdea548609c23ca38089d9ac9ac_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0c92ecdea548609c23ca38089d9ac9ac_JaffaCakes118
-
Size
172KB
-
MD5
0c92ecdea548609c23ca38089d9ac9ac
-
SHA1
cbd267cd02bc8bb4a231dea93b45b7af78673ba2
-
SHA256
9efb9a33031b93bd732e720b0379dbfb738c0c3c0bfd1628e32f0404ff6fd1ef
-
SHA512
694f7607c880f90c344f60a88222e874b889565efd40a3188ec269622911b865864ff78b05e8f81d964a299699ead64e28d04206321e3268df1672d2f1520a2c
-
SSDEEP
3072:k593IfR180WMhvokVk2UQAfGqgPV1iCFLZmBLCfya:41INO0fDLOw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c92ecdea548609c23ca38089d9ac9ac_JaffaCakes118
Files
-
0c92ecdea548609c23ca38089d9ac9ac_JaffaCakes118.exe windows:5 windows x86 arch:x86
fce59ea2fd1016368322dad404944b3e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
GetCommandLineA
GetModuleHandleW
GetCurrentThread
lstrcmpiA
lstrcmpA
lstrlenW
CopyFileA
GetCurrentProcess
GetVersion
QueryPerformanceCounter
DeleteFileA
GetCurrentProcessId
GetThreadLocale
GetUserDefaultLangID
GetCurrentThreadId
lstrcmpiW
IsDebuggerPresent
MulDiv
GetProcessHeap
GetModuleHandleA
GetStartupInfoA
RemoveDirectoryA
GlobalFindAtomW
GetACP
GetOEMCP
DeleteFileW
GetWindowsDirectoryA
GetConsoleOutputCP
GetDriveTypeA
SetCurrentDirectoryA
GetCommandLineW
GlobalFindAtomA
VirtualAlloc
VirtualFree
gdi32
GetTextMetricsA
GetStockObject
GetPixel
GetObjectA
CreateFontIndirectA
SetStretchBltMode
DeleteObject
RestoreDC
GetDeviceCaps
DeleteDC
SetTextAlign
SelectPalette
SetMapMode
SetTextColor
CreateSolidBrush
GetClipBox
SelectObject
PatBlt
LineTo
CreatePen
CreateCompatibleDC
RectVisible
CreatePalette
SaveDC
user32
GetDesktopWindow
CharNextA
GetParent
TranslateMessage
GetDC
GetSystemMetrics
glu32
gluNurbsCallback
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Kblvvasy Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Ndkjmhxq Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ