Static task
static1
Behavioral task
behavioral1
Sample
0e1fd5685e763d0b6e82b646dfc92a69_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e1fd5685e763d0b6e82b646dfc92a69_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0e1fd5685e763d0b6e82b646dfc92a69_JaffaCakes118
-
Size
55KB
-
MD5
0e1fd5685e763d0b6e82b646dfc92a69
-
SHA1
b8304281dedcecd06ca0c7dc1c91b0a3f6891b3a
-
SHA256
d6c37851ed28561f6a34ca578996f8ed74958932c0edaf72dfb7108baba558aa
-
SHA512
f43823701c60334fa6a7ff772d0a876e05337a568172d3a94d83894083578a5b22150264e5594936c1c059e1e946d3f64a31a03ab8757ba44e5488f20b6fd720
-
SSDEEP
768:jP+PBWr1G72D19bwXw6lCi2taZJ3+2vORoFc704PQPpdbMbe6EZWOoHq:jP+ba19bKvOYZN8oUUpOa6EZWOoHq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e1fd5685e763d0b6e82b646dfc92a69_JaffaCakes118
Files
-
0e1fd5685e763d0b6e82b646dfc92a69_JaffaCakes118.exe windows:4 windows x86 arch:x86
d82d14ccb74955bc5447f8c6c1bb4ac3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
GetModuleHandleA
CreateThread
GetStartupInfoA
Sleep
user32
DefWindowProcA
LoadImageA
MessageBoxA
PostQuitMessage
UnregisterClassA
ChangeDisplaySettingsA
FrameRect
GetDC
FillRect
EndPaint
BeginPaint
SendMessageA
DispatchMessageA
TranslateMessage
GetMessageA
UpdateWindow
LoadCursorA
LoadIconA
RegisterClassA
gdi32
GetObjectA
DeleteDC
BitBlt
SelectObject
CreateCompatibleDC
TextOutA
SetBkColor
SetTextColor
CreateFontIndirectA
CreateRectRgn
FillRgn
Rectangle
CreateSolidBrush
ole32
CoInitialize
msvcp60
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
msvcrt
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
__p__commode
_exit
free
__CxxFrameHandler
memmove
memchr
getenv
__p__fmode
__set_app_type
_controlfp
_stricmp
_XcptFilter
_except_handler3
??2@YAPAXI@Z
sprintf
malloc
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ