Static task
static1
Behavioral task
behavioral1
Sample
679af0f793e987c0aa5edc076f1b5d3a_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
679af0f793e987c0aa5edc076f1b5d3a_JaffaCakes118
-
Size
93KB
-
MD5
679af0f793e987c0aa5edc076f1b5d3a
-
SHA1
1c33fd711b15171f8d4a248421e6195121080173
-
SHA256
33e6c8d25cf542edadf6f7e8af069fa2ff8c9d94cf7f03917abb38d10fcde488
-
SHA512
8c41b8b8fb3326a1512a0a2b031af9cf37b876d53865a220e905c17a699cf8a869d63e6a7209e0a0c6a06345b88ff2a67e7dedda2d45994c5d0321bed60c9fb6
-
SSDEEP
1536:d+Lvs4YZfi/6tGaAZe+DE0r+E8oWQ65S7dPKjs8yGLeOMkr3jM4XfVVEV:v4SuoGaAg+DEuxWQKSAgfGKpk7j5N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 679af0f793e987c0aa5edc076f1b5d3a_JaffaCakes118
Files
-
679af0f793e987c0aa5edc076f1b5d3a_JaffaCakes118.exe windows:5 windows x86 arch:x86
1e045234b69133e95044964b7994ca0e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowLongA
GetClipboardOwner
EnableScrollBar
SetWindowTextA
BeginPaint
DispatchMessageA
IsDlgButtonChecked
CheckDlgButton
EndPaint
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
gdi32
CreatePatternBrush
SetBkMode
DeleteObject
GetStockObject
PolyBezier
CreateBrushIndirect
ole32
CoGetStandardMarshal
StgIsStorageFile
OleSetContainedObject
CoUnmarshalHresult
CoGetObjectContext
CoWaitForMultipleHandles
oleaut32
SafeArrayAllocDescriptor
SafeArrayDestroyDescriptor
kernel32
GetFileAttributesA
GetACP
GetModuleHandleA
GetLastError
HeapDestroy
InterlockedDecrement
GetStartupInfoA
HeapAlloc
HeapCreate
DeleteCriticalSection
LeaveCriticalSection
QueryPerformanceCounter
HeapFree
EnterCriticalSection
GetCommandLineA
InitializeCriticalSection
Sections
.text Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE