Static task
static1
Behavioral task
behavioral1
Sample
0c66357f04082a8b148a2906c86f7f50_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0c66357f04082a8b148a2906c86f7f50_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0c66357f04082a8b148a2906c86f7f50_JaffaCakes118
-
Size
36KB
-
MD5
0c66357f04082a8b148a2906c86f7f50
-
SHA1
89f7136c0b2fe5127290f2b45a9b3c386ccf987d
-
SHA256
eb3e15d18770e21d3adbbcec5c421e55b23b5675fbfea3866b451e3cef5130a1
-
SHA512
1450930fe9c3411d6f806e49f7a90a03741491fbf3806a11f33b1a1c25405a72e4f84cc2057167c29117b817cb4ff59859a599a20fd02eef384e477b3238bad0
-
SSDEEP
384:z4en25jjPMKgFVq+R/nv2ieFVD275fXrY+pwfe1DfLmGR6Qnzn/0jny6g9EupIyv:o5X/gm6nfZ5DUfEjmG8QnzngXHBA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c66357f04082a8b148a2906c86f7f50_JaffaCakes118
Files
-
0c66357f04082a8b148a2906c86f7f50_JaffaCakes118.exe windows:4 windows x86 arch:x86
df0e79d97f00107506f8943f65032731
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EndDialog
SendMessageA
DestroyWindow
DialogBoxParamA
DefWindowProcA
BeginPaint
GetClientRect
DrawTextA
EndPaint
PostQuitMessage
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
GetMessageA
TranslateMessage
DispatchMessageA
kernel32
GetStartupInfoA
GetModuleHandleA
GetCurrentDirectoryA
GetLastError
LoadLibraryA
msvcrt
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
__getmainargs
__p__acmdln
exit
_XcptFilter
_exit
fgetc
fflush
fputc
_controlfp
_initterm
memset
wcsncmp
wcslen
memcpy
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ