Static task
static1
Behavioral task
behavioral1
Sample
27d92473a76f00195c0d56ddc584dc07_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
27d92473a76f00195c0d56ddc584dc07_JaffaCakes118
-
Size
292KB
-
MD5
27d92473a76f00195c0d56ddc584dc07
-
SHA1
f5a28d373882086a7712a4a6997b8054957953d1
-
SHA256
812c5285b64f10051abffbecf9a57ad44b07eabd5611f38a796ee81fd43cf81d
-
SHA512
e560b26ac65a9c46d70bca3febdc905bfe672c7482f6e710e88004aa4214eece98252d9e0d24ab80a2a3d299d09bf4b9bf07ef0262e73aa68b82090b9da528c8
-
SSDEEP
6144:Pa0tKsnXahLw93Ghnn0Ob/aS/OyJtgfdaGxAqDUwX0uw:PaPsKa1In0ObtOZ1XAqDn+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 27d92473a76f00195c0d56ddc584dc07_JaffaCakes118
Files
-
27d92473a76f00195c0d56ddc584dc07_JaffaCakes118.exe windows:4 windows x86 arch:x86
e304217fc16c011615a0ec22783cbfae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
lstrcatA
InitializeCriticalSection
GetProcAddress
LocalFree
RaiseException
LocalAlloc
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
SearchPathA
ResumeThread
WriteProcessMemory
GetPrivateProfileSectionA
GetStringTypeA
LCMapStringW
LCMapStringA
RtlUnwind
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
user32
DefWindowProcA
AdjustWindowRectEx
Sections
0 Size: 228KB - Virtual size: 720KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1 Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 44KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: 7KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE