Static task
static1
Behavioral task
behavioral1
Sample
2c44f3573075385ec4466105542ebd8c_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
2c44f3573075385ec4466105542ebd8c_JaffaCakes118
-
Size
93KB
-
MD5
2c44f3573075385ec4466105542ebd8c
-
SHA1
0972f4ec4efbda833384c99f28748076d0ccd3ac
-
SHA256
3929bd355f2a3080267c3325cb845689b156b912a840b4abc26af83cee1f8aff
-
SHA512
39214b0fccab69d2c70d07c14dbc342d19eca0393bd61b535662aaaff9d0b237a356775997e50e83c1e80cc262ec2fc45b8ac39f0d6d14276dc1aed8f3a278b9
-
SSDEEP
1536:ImPlTykJ5NTlpvjrzDxnJxAdbRMdTaH8VJ8J3v7DElnC9FkWHXp3P1:IglTykHNTPjHDxzAdlMpacH8J3aC5P
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c44f3573075385ec4466105542ebd8c_JaffaCakes118
Files
-
2c44f3573075385ec4466105542ebd8c_JaffaCakes118.exe windows:5 windows x86 arch:x86
d286c7d4cb396f3d35fc560c13740531
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsDlgButtonChecked
CheckDlgButton
SetWindowTextA
EnableScrollBar
BeginPaint
DispatchMessageA
GetWindowLongA
GetClipboardOwner
LoadIconA
LoadCursorA
RegisterClassExA
EndPaint
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
gdi32
CreateBrushIndirect
GetStockObject
PolyBezier
SetBkMode
CreatePatternBrush
DeleteObject
ole32
CoGetStandardMarshal
CoUnmarshalHresult
CoWaitForMultipleHandles
OleSetContainedObject
StgIsStorageFile
CoGetObjectContext
oleaut32
SafeArrayAllocDescriptor
SafeArrayDestroyDescriptor
kernel32
HeapFree
GetStartupInfoA
InterlockedDecrement
LeaveCriticalSection
HeapDestroy
EnterCriticalSection
InitializeCriticalSection
HeapAlloc
HeapCreate
GetCommandLineA
GetFileAttributesA
GetACP
QueryPerformanceCounter
GetModuleHandleA
GetLastError
DeleteCriticalSection
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE