Static task
static1
Behavioral task
behavioral1
Sample
44ef8350704a8fa7e396cda5a3559b08_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
44ef8350704a8fa7e396cda5a3559b08_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
44ef8350704a8fa7e396cda5a3559b08_JaffaCakes118
-
Size
58KB
-
MD5
44ef8350704a8fa7e396cda5a3559b08
-
SHA1
c6f7b70f1159057f1b4a5cb9eb0802f33f231443
-
SHA256
dc3af0e5629f569f1bfcf4faaaec45bffcbecfee0a6fbc641a3ad7f1f6138bb5
-
SHA512
550fb1202f26e9a53452b35e56bb669fc018dd5400c0de71e842132689a298f2196466a5bbd8969b4b352df1a49cb72a633d192d9518dc9b7610b1ca163cbf04
-
SSDEEP
768:LP+PmWr1G79j19bj3pJoL4rlAlCNo25g0r7dzG4AO2O4SxCibnzMXDNhTUEjIy/j:LP+4d19bQqlBnlG4wQCYz+D/TUAn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44ef8350704a8fa7e396cda5a3559b08_JaffaCakes118
Files
-
44ef8350704a8fa7e396cda5a3559b08_JaffaCakes118.exe windows:4 windows x86 arch:x86
d82d14ccb74955bc5447f8c6c1bb4ac3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
GetModuleHandleA
CreateThread
GetStartupInfoA
Sleep
user32
DefWindowProcA
LoadImageA
MessageBoxA
PostQuitMessage
UnregisterClassA
ChangeDisplaySettingsA
FrameRect
GetDC
FillRect
EndPaint
BeginPaint
SendMessageA
DispatchMessageA
TranslateMessage
GetMessageA
UpdateWindow
LoadCursorA
LoadIconA
RegisterClassA
gdi32
GetObjectA
DeleteDC
BitBlt
SelectObject
CreateCompatibleDC
TextOutA
SetBkColor
SetTextColor
CreateFontIndirectA
CreateRectRgn
FillRgn
Rectangle
CreateSolidBrush
ole32
CoInitialize
msvcp60
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
msvcrt
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
__p__commode
_exit
free
__CxxFrameHandler
memmove
memchr
getenv
__p__fmode
__set_app_type
_controlfp
_stricmp
_XcptFilter
_except_handler3
??2@YAPAXI@Z
sprintf
malloc
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ