BWLurIv4TgXud
Static task
static1
Behavioral task
behavioral1
Sample
1482f06ff2518aec4e8aea91497656f0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1482f06ff2518aec4e8aea91497656f0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1482f06ff2518aec4e8aea91497656f0_JaffaCakes118
-
Size
125KB
-
MD5
1482f06ff2518aec4e8aea91497656f0
-
SHA1
5050fd37944b5df1fe4db04dce8a8c0d038817f0
-
SHA256
3e0efc4bbafe2a040b7180b25d20ba6211ab394ef897c8625bacf9ce81e5d765
-
SHA512
a43e09546ba7e236010d4296a7bba22be31ac810e98d1f290ad242d43df14af3d841370f6c9d0b2da52cb4b16a8ee347af97a3dc4b29b582637f02981a78068e
-
SSDEEP
3072:jHw21Td2WeXJRsCBiqTphrmIF6Y1OJYpYnrS/BBNh+MAm5tUdm7Xjwfom1:jQ21yJR9iqT7lAYIsYm/ffUmrj4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1482f06ff2518aec4e8aea91497656f0_JaffaCakes118
Files
-
1482f06ff2518aec4e8aea91497656f0_JaffaCakes118.exe windows:4 windows x86 arch:x86
89b841ce5f469fa0da3d9b30b681d3e2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
LineTo
CreateBitmap
CreatePalette
CreateFontIndirectA
GetBkColor
GetRgnBox
comctl32
ImageList_Add
ImageList_Remove
ImageList_GetBkColor
user32
OpenIcon
CharNextA
ScreenToClient
GetScrollPos
GetMessagePos
GetClipboardData
EnableWindow
GetMenu
SystemParametersInfoA
SendMessageA
MessageBeep
GetMenuItemInfoA
SetWindowTextA
InvalidateRect
DestroyWindow
DefWindowProcA
wsprintfA
PeekMessageA
GetSubMenu
GetKeyboardLayoutList
GetClassLongA
IsCharLowerA
RedrawWindow
SetFocus
GetMenuStringA
GetKeyboardLayoutNameA
GetFocus
GetDesktopWindow
DefMDIChildProcA
PeekMessageW
DrawMenuBar
InsertMenuA
EnableScrollBar
AdjustWindowRectEx
ShowScrollBar
SetWindowPos
IsWindow
GetParent
DeleteMenu
GetDC
PtInRect
ShowOwnedPopups
IsZoomed
FrameRect
UnhookWindowsHookEx
LoadBitmapA
SetPropA
GetClassInfoA
GetPropA
GetTopWindow
DispatchMessageA
GetClassNameA
EndPaint
SetClipboardData
GetKeyNameTextA
EnumThreadWindows
GetMenuItemCount
IsIconic
TrackPopupMenu
GetMenuItemID
CallWindowProcA
MapWindowPoints
SetCursor
CallNextHookEx
kernel32
GetDiskFreeSpaceA
GetStringTypeA
GetFileType
GetFileAttributesA
GetCurrentProcess
GetProcessHeap
MoveFileExA
GetModuleFileNameA
GetCommandLineA
GetStdHandle
DeleteFileA
DeleteCriticalSection
InitializeCriticalSection
FindFirstFileA
FreeLibrary
GetModuleHandleA
ExitProcess
lstrlenA
LocalReAlloc
SetFilePointer
lstrlenW
VirtualQuery
GlobalAddAtomA
SetErrorMode
FindResourceA
lstrcpyA
GlobalDeleteAtom
SetEndOfFile
GetVersion
HeapFree
GetDateFormatA
LoadLibraryExA
GetLocaleInfoA
LocalAlloc
SetThreadLocale
HeapDestroy
CloseHandle
GetOEMCP
SetHandleCount
GetModuleHandleW
RaiseException
HeapAlloc
GlobalFindAtomA
LockResource
EnumCalendarInfoA
LocalFree
MoveFileA
GetLocalTime
LoadLibraryA
FormatMessageA
VirtualAllocEx
ExitThread
ResetEvent
GetTempPathA
SizeofResource
GetCurrentThread
lstrcpynA
SetLastError
GetVersionExA
GetProcAddress
GetStartupInfoA
CompareStringA
VirtualAlloc
GetFullPathNameA
GetStringTypeW
Exports
Exports
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 105KB - Virtual size: 241KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ