Static task
static1
Behavioral task
behavioral1
Sample
1078a275a5df630404635e0f3064e5aa_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1078a275a5df630404635e0f3064e5aa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1078a275a5df630404635e0f3064e5aa_JaffaCakes118
-
Size
701KB
-
MD5
1078a275a5df630404635e0f3064e5aa
-
SHA1
f59d182b55b1bc6a5c143d0f236aeacf82671190
-
SHA256
c093edf379cd8820e71fef82a866efd70d1d0cea3e78dbe4d18e901faa332087
-
SHA512
f11cfa0bb8fc67ba4bc6817329a1e2c700cad90630dac2c7e7e7c7ec1413b777f318677674f0092d9a340ce0b88a60abdce5a628ae79040fe63f20d257dbec5e
-
SSDEEP
12288:POhc7xVQKu2X+pPz7XJbQ4XR4PI4gY0vOUrmM6E6VdW:cIbQ6Etbv9ZYwOUrbSdW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1078a275a5df630404635e0f3064e5aa_JaffaCakes118
Files
-
1078a275a5df630404635e0f3064e5aa_JaffaCakes118.exe windows:4 windows x86 arch:x86
06a0e40e93055fb4656ecfda71124375
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
GetVersion
LocalFree
GetTickCount
GetVersionExA
GetLastError
GetFileSize
Sleep
GlobalAlloc
GetStartupInfoA
GetCommandLineA
lstrcpyA
user32
DialogBoxParamA
EndPaint
ShowWindow
BeginPaint
SetFocus
DispatchMessageA
ScreenToClient
MessageBoxA
GetWindowRect
GetMessageA
GetClientRect
TranslateMessage
CreateWindowExA
msvcrt
__set_app_type
_acmdln
_except_handler3
_controlfp
_exit
wcstoul
_c_exit
exit
wcschr
_XcptFilter
__p__fmode
__p__commode
toupper
memmove
__setusermatherr
rand
__getmainargs
__CxxFrameHandler
_adjust_fdiv
_initterm
wcslen
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 679KB - Virtual size: 680KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 728KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ