Static task
static1
Behavioral task
behavioral1
Sample
128de860c0c710ce31c2a70e38cd63b2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
128de860c0c710ce31c2a70e38cd63b2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
128de860c0c710ce31c2a70e38cd63b2_JaffaCakes118
-
Size
698KB
-
MD5
128de860c0c710ce31c2a70e38cd63b2
-
SHA1
1017395d3cfc38d1ba02832df08211766684f953
-
SHA256
ed4d0fa7f7557b9fb5e2cd4eaf70734f16b1656c3219fe05546b7d755879f318
-
SHA512
b86b77cc4cfe95a096f1f775519689cb2e7d9dd1aac4c6bf06d609d6c45b30c508381b3f4dcfd74691ac12b16bd048eed8e6804bf0cb5fe8827de4f5081ef567
-
SSDEEP
12288:/Mn9jTn8JLpspByibowr1t2Sl/ScMCSUZaPEaoz0Ndtoij:CjTK+nyi1aUS0aP7outoij
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 128de860c0c710ce31c2a70e38cd63b2_JaffaCakes118
Files
-
128de860c0c710ce31c2a70e38cd63b2_JaffaCakes118.exe windows:4 windows x86 arch:x86
629ad41be39f461e18cbe1ca0a03a465
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
GetVersion
GetCommandLineA
FreeLibrary
user32
GetMessageA
BeginPaint
GetFocus
EndPaint
DispatchMessageA
DefWindowProcA
GetSysColor
SetFocus
ScreenToClient
LoadIconA
ShowWindow
SetWindowTextA
DestroyWindow
CreateWindowExA
GetClientRect
msvcrt
wcschr
_controlfp
__p__commode
_acmdln
memmove
wcslen
_XcptFilter
toupper
_exit
__setusermatherr
__CxxFrameHandler
__getmainargs
rand
__set_app_type
gdi32
CreateFontIndirectA
SetBkMode
SelectObject
GetTextMetricsA
LineTo
SetPixel
GetTextColor
GetTextExtentPoint32A
PatBlt
DeleteObject
CreateCompatibleDC
ExtTextOutA
Sections
.text Size: 1024B - Virtual size: 943B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 692KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ