Static task
static1
Behavioral task
behavioral1
Sample
4a5b6a47388c80a1120b9c12b49b3793_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
4a5b6a47388c80a1120b9c12b49b3793_JaffaCakes118
-
Size
93KB
-
MD5
4a5b6a47388c80a1120b9c12b49b3793
-
SHA1
934796b36a166269734a84a0194f8887ca6998c0
-
SHA256
d33fcb6c15350766dd7fc0c5a9c0ada05365b71a45df9eea402d3be79a1b72a1
-
SHA512
7468ab48e53e1899741b0d83d3021f7c4cb75a3ac5b998387eae0596f6ade1b20194af1b49785febf78f2e64e0ebae8952173503679d54f3653e2bdeceae68ea
-
SSDEEP
1536:EOOYMekL7d2VHGgOncD9ViP9q1F3zeNDAQMu52cAjbSjwPBLWCiueU0gScX:I6kL7dgmNcpVm9qKNlD52/PSkBLziLUD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a5b6a47388c80a1120b9c12b49b3793_JaffaCakes118
Files
-
4a5b6a47388c80a1120b9c12b49b3793_JaffaCakes118.exe windows:5 windows x86 arch:x86
1106626c577f49f518acd3a0d558f66d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DispatchMessageA
GetClipboardViewer
CheckDlgButton
EnableScrollBar
GetWindowLongA
LoadIconA
LoadCursorA
RegisterClassExA
IsDlgButtonChecked
SetWindowTextA
BeginPaint
EndPaint
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
gdi32
SetMapMode
SetBkMode
CreatePatternBrush
CreateRectRgn
DeleteObject
GetStockObject
ole32
CoInitialize
StgIsStorageFile
CoGetCancelObject
CoUnmarshalHresult
OleSetContainedObject
CoWaitForMultipleHandles
CoIsOle1Class
kernel32
HeapFree
GetCommandLineA
GetACP
EnterCriticalSection
InitializeCriticalSection
HeapDestroy
GetStartupInfoA
GetLastError
HeapAlloc
HeapCreate
QueryPerformanceCounter
GetFileAttributesA
DeleteCriticalSection
LeaveCriticalSection
InterlockedDecrement
GetModuleHandleA
GetEnvironmentStrings
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE