Static task
static1
Behavioral task
behavioral1
Sample
3f297bc4b73a19c2e2a226f1dbefecff_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f297bc4b73a19c2e2a226f1dbefecff_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3f297bc4b73a19c2e2a226f1dbefecff_JaffaCakes118
-
Size
7KB
-
MD5
3f297bc4b73a19c2e2a226f1dbefecff
-
SHA1
a60da9a0111a9656e36af65c28992087a63117e6
-
SHA256
7d09cd3547d3b50b8c8a6a809abaff34bbff7cf08fb0e54298c78bfc24d14a56
-
SHA512
4cfa43b7dac1eebfbd14b09c715790735a4db3788ef0e43e05ef66c8eab7bcc22cba70e7746dc01b3e1820e9852acd4eed639e897c34dc35936ad262daf400d9
-
SSDEEP
192:8wmxjvti/+hIs8malRTU746KBBY7BuPTeSPhba:Mj1++hfxoVXlu7BoPY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f297bc4b73a19c2e2a226f1dbefecff_JaffaCakes118
Files
-
3f297bc4b73a19c2e2a226f1dbefecff_JaffaCakes118.exe windows:1 windows x86 arch:x86
4de08d8bb83f5fb806e442c87785b569
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetModuleHandleA
GetSystemTime
QueryPerformanceCounter
RtlUnwind
lstrlenA
user32
CallWindowProcA
GetWindowRect
GetLastActivePopup
GetDlgItem
SetDlgItemTextA
IsDialogMessageA
LoadCursorA
GetMessageA
GetWindowLongA
SetWindowLongA
GetDesktopWindow
TranslateMessage
DispatchMessageA
GetDC
ReleaseDC
wsprintfA
SendMessageA
RegisterClassExA
PostQuitMessage
UnregisterClassA
CreateWindowExA
MoveWindow
DefWindowProcA
gdi32
GetStockObject
GetTextMetricsA
SelectObject
crtdll
__GetMainArgs
exit
memcpy
raise
signal
strchr
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 44B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 616B - Virtual size: 616B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE