W:\sTrK\hieaPCjCqodo4\hgGIDdE\EniUlQe.lrb
Static task
static1
Behavioral task
behavioral1
Sample
27a22cf86b4496869ab296441a2a93bf_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
27a22cf86b4496869ab296441a2a93bf_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
27a22cf86b4496869ab296441a2a93bf_JaffaCakes118
-
Size
86KB
-
MD5
27a22cf86b4496869ab296441a2a93bf
-
SHA1
7a4457d928479e19b5dc3eace3fd2ff683f6d63a
-
SHA256
5a1c1af2892c084310de879f1549c819470668727051cb7d55e8f26d05a1f8c5
-
SHA512
27e2cacc818fef0675f49c0a01bb9190b65adc9121c64888338d6a05db5c293a62aef3a9ec099f512f47f40e020d99ce509ae2fcc25c168a70ef238cf2eec108
-
SSDEEP
1536:wqNF+lnhtRNOoALhaA0zr2VyucHV1f+zylLcUWhMkcw7Seu6/vSDTyBKg:96htRNDYFOrencjhc5OkcBeu6nWTyL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 27a22cf86b4496869ab296441a2a93bf_JaffaCakes118
Files
-
27a22cf86b4496869ab296441a2a93bf_JaffaCakes118.exe windows:5 windows x86 arch:x86
84164121d4e4c24e5df0fa7adaacb3c5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
ChrCmpIW
ord158
PathMakePrettyW
StrCpyNW
StrCatW
StrStrA
PathCompactPathExA
StrCmpNIW
PathFindNextComponentW
kernel32
CancelWaitableTimer
OpenSemaphoreA
lstrcmpiA
SetMailslotInfo
CreateHardLinkA
GetSystemTimeAdjustment
GetModuleHandleA
SetupComm
GetCommModemStatus
SetInformationJobObject
GlobalCompact
SetMessageWaitingIndicator
IsBadWritePtr
SetTapePosition
LoadLibraryA
GetModuleHandleExA
LoadLibraryExW
user32
CopyImage
PostMessageW
InvalidateRgn
GetClipboardOwner
CreateCursor
DrawIcon
GetClientRect
GetWindowTextLengthA
SetWinEventHook
SetRect
EnableMenuItem
SystemParametersInfoA
MapWindowPoints
GetDialogBaseUnits
gdi32
CreateFontIndirectW
GetDIBits
GetRgnBox
CreatePatternBrush
GetTextCharset
CreateEnhMetaFileW
GetEnhMetaFileBits
SetBkColor
SetArcDirection
PlayEnhMetaFileRecord
SetViewportExtEx
msvcrt
memset
Exports
Exports
?_ChildWindowFromPoint@@YGKPAD0@Z
?_ChildWindowFromPointEx@@YGKPAD0PAG@Z
?_WindowFromPhysicalPoint@@YGPAXPAKPAEPAI@Z
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.icode Size: 1024B - Virtual size: 643B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.m_data Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CData Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
NData Size: 1024B - Virtual size: 532B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 776B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ