Static task
static1
Behavioral task
behavioral1
Sample
132a8928984c8a3fcf2203952bebc680_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
132a8928984c8a3fcf2203952bebc680_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
132a8928984c8a3fcf2203952bebc680_JaffaCakes118
-
Size
167KB
-
MD5
132a8928984c8a3fcf2203952bebc680
-
SHA1
4e86eaea2fd80eb20cf0f9b2c7bd74f13ee05518
-
SHA256
02f1e47c9d29d042220242d757f73b6d23db7450b5af89aaf1c73898d29e6db6
-
SHA512
248fc83ee5052dae03ca295e25e8b5be44c27c86b34b4375ce219f34d5ab385eeca2ba22fc24c81f714fc0e7e55dbd1e090fe3df48bf8811ad0935775f6f5855
-
SSDEEP
3072:JGOWCTLLjDiNkpAaA8CvfMqz9lWZFVirmz3UyrFrQoLQ:1LONkpmcKdaz37RbQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 132a8928984c8a3fcf2203952bebc680_JaffaCakes118
Files
-
132a8928984c8a3fcf2203952bebc680_JaffaCakes118.exe windows:5 windows x86 arch:x86
cc9919da77a4c0db3c5e6157983a8a2d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenW
GetDriveTypeA
GetCurrentThread
lstrcmpiA
IsDebuggerPresent
lstrcmpiW
GetCurrentThreadId
lstrlenA
GetProcessHeap
GetCommandLineW
SetCurrentDirectoryA
VirtualAlloc
GetModuleHandleA
DeleteFileW
VirtualFree
GetVersion
GetCurrentProcess
GetStartupInfoA
lstrcmpA
GetThreadLocale
CopyFileA
GlobalFindAtomW
DeleteFileA
GetConsoleOutputCP
GetACP
RemoveDirectoryA
GetModuleHandleW
GetTickCount
GlobalFindAtomA
GetWindowsDirectoryA
MulDiv
GetCurrentProcessId
QueryPerformanceCounter
GetOEMCP
GetCommandLineA
user32
GetParent
GetDC
GetDesktopWindow
TranslateMessage
CharNextA
GetSystemMetrics
gdi32
LineTo
SaveDC
SetMapMode
PatBlt
SetStretchBltMode
RectVisible
DeleteObject
GetDeviceCaps
GetStockObject
GetPixel
GetObjectA
SelectObject
CreatePalette
RestoreDC
CreateCompatibleDC
CreateSolidBrush
DeleteDC
SetTextAlign
SetTextColor
CreatePen
GetTextMetricsA
GetClipBox
CreateFontIndirectA
SelectPalette
glu32
gluNurbsCallback
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Kpdxp Dh Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Nxsupwec Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ