Static task
static1
Behavioral task
behavioral1
Sample
882e2c2b51650e2fec7529ae437fc3a5_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
882e2c2b51650e2fec7529ae437fc3a5_JaffaCakes118
-
Size
436KB
-
MD5
882e2c2b51650e2fec7529ae437fc3a5
-
SHA1
5abc069eaf62469f4032e0cdf46efcc1b1a61fe0
-
SHA256
b1ebdd1e1d490919894d339d4d512ef25f382d18a77557fd28785ef4fcd2afdd
-
SHA512
0ebbb91c318642189d65ca3fcac8565dbed80cd030af801aa1b129e3380b0441bdcba42abc5c1c90b23f3637a223718ee548e1da350427d25cdaa2653ce5bc33
-
SSDEEP
12288:NSwD3oXqDZY8Ah9YNQK20hjrmDfcX63iuO9SdqED8fAmYkZe3K0+6Q3tnf39yo1y:MEF2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 882e2c2b51650e2fec7529ae437fc3a5_JaffaCakes118
Files
-
882e2c2b51650e2fec7529ae437fc3a5_JaffaCakes118.exe windows:4 windows x86 arch:x86
80dcd55e47f5798c77880f324e52b646
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadCursorA
LoadStringA
TranslateMessage
DispatchMessageA
DialogBoxParamA
BeginPaint
DrawTextA
EndPaint
RegisterClassExA
PostMessageA
DefWindowProcA
SetTimer
EndDialog
wsprintfA
DestroyWindow
SendMessageA
CreateWindowExA
ShowWindow
UpdateWindow
PostQuitMessage
GetMessageA
MessageBoxW
SetWindowTextW
MessageBeep
LoadAcceleratorsA
SetWindowLongW
kernel32
ExitProcess
GetCommandLineA
HeapAlloc
GetProcessHeap
GetModuleHandleA
lstrlenA
GetCurrentDirectoryA
GetVersionExA
GetTempPathA
lstrcatA
GetCommandLineW
Sleep
OutputDebugStringA
GetLastError
lstrlenW
GetStartupInfoA
lstrcmpW
gdi32
DeleteDC
shell32
CommandLineToArgvW
Sections
.text Size: 294KB - Virtual size: 294KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ