Static task
static1
Behavioral task
behavioral1
Sample
0f0d93438708f6505677fcbd88108f65_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f0d93438708f6505677fcbd88108f65_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0f0d93438708f6505677fcbd88108f65_JaffaCakes118
-
Size
45KB
-
MD5
0f0d93438708f6505677fcbd88108f65
-
SHA1
b4a7aa0830de93c80cba0b11a089992942839483
-
SHA256
624b393174e0df70be83b357c3adb866d538da5bb09f47de43f893766de34bff
-
SHA512
daff5f66e011f2e4964771bb3bf3a7dab889c7ca0fef0a861349e0fc312b0fd885591434e7f0eac93b6df5d5620134e670666cd07126113e183c07cd0431fb42
-
SSDEEP
768:Mv5v8B+ts5do9KY9mxBNaw032mZmQBiQQfnocyioKxvQ2hQ:Ia+ts7o9KY9fYmZmk7QfnBpvNhQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f0d93438708f6505677fcbd88108f65_JaffaCakes118
Files
-
0f0d93438708f6505677fcbd88108f65_JaffaCakes118.exe windows:4 windows x86 arch:x86
9fce741c8e25b0ad683e66510b2de1cd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
GetFileVersionInfoW
VerQueryValueA
GetFileVersionInfoSizeW
advapi32
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
OpenThreadToken
RegSetValueExW
RegQueryValueExW
GetTokenInformation
RegSetValueExA
RegDeleteValueW
RegOpenKeyExA
RegOpenKeyW
RegCreateKeyExW
RegQueryValueExA
RegDeleteKeyW
SetSecurityDescriptorDacl
gdi32
SetWindowExtEx
GetDIBits
SetMetaRgn
PatBlt
SetTextColor
GetPaletteEntries
TranslateCharsetInfo
Rectangle
SelectObject
ExtTextOutA
SetWindowOrgEx
RestoreDC
CreateFontIndirectW
SetMapMode
SetBkMode
GetTextExtentPointW
GetDeviceCaps
GetTextExtentPoint32W
IntersectClipRect
user32
GetFocus
EndPaint
SetWindowTextW
IsDlgButtonChecked
msvcrt
_onexit
wcsncmp
_ftol
wcschr
swprintf
memmove
_cexit
_except_handler3
_wcsicmp
_vsnprintf
kernel32
HeapAlloc
InterlockedCompareExchange
GetProcessHeap
GetCurrentProcessId
GetModuleHandleA
GetVersion
VirtualAlloc
GetCurrentProcess
VirtualFree
GetCurrentThread
ExitProcess
GetCommandLineA
Sections
.text Size: 10KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 14KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 13KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ