Static task
static1
Behavioral task
behavioral1
Sample
7268167ee7e0fe6bc1718b06bc499e61_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
7268167ee7e0fe6bc1718b06bc499e61_JaffaCakes118
-
Size
93KB
-
MD5
7268167ee7e0fe6bc1718b06bc499e61
-
SHA1
561601da34300ee5fcbbd9d90c34297448046b24
-
SHA256
21bffa3cef927ac26df304ba7f996dc1c7d9fa2f4b02930c150d72400488893d
-
SHA512
7927487f4526aefa299349b8be179d84df1d03af7a4eb1b7dd6feb3239533c0c271a9d6dadfd88ba7fec1c6e1319eded45ae2272cd4cb75db409314753cf74fd
-
SSDEEP
1536:i1Qhx9G5FnMVrisaezE0EsM7DLZ3UkfR1X78dNqaM0i2BlgrRPazGWM1nXubvd:9aEPaezE0EsMH15fR1X7N7PrRsDYXav
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 7268167ee7e0fe6bc1718b06bc499e61_JaffaCakes118
Files
-
7268167ee7e0fe6bc1718b06bc499e61_JaffaCakes118.exe windows:5 windows x86 arch:x86
686993505ea7d6d1cdb85cee39d5440f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DispatchMessageA
EnableScrollBar
IsDlgButtonChecked
GetClipboardViewer
GetWindowLongA
CheckDlgButton
SetWindowTextA
BeginPaint
EndPaint
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
gdi32
CreateEllipticRgn
SetBkMode
SetMapMode
CreatePatternBrush
DeleteObject
GetStockObject
CreatePen
ole32
CoGetCallerTID
CoWaitForMultipleHandles
CoIsOle1Class
OleSetContainedObject
CoUnmarshalHresult
StgIsStorageFile
CoGetTreatAsClass
kernel32
GetFileAttributesExA
QueryPerformanceFrequency
LeaveCriticalSection
EnterCriticalSection
GetCommandLineA
GetStartupInfoA
GetLastError
HeapAlloc
HeapCreate
GetACP
GetModuleHandleA
HeapFree
HeapDestroy
GetEnvironmentStrings
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE