Static task
static1
Behavioral task
behavioral1
Sample
7837be000100873acd528a30c046e6a9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7837be000100873acd528a30c046e6a9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7837be000100873acd528a30c046e6a9_JaffaCakes118
-
Size
54KB
-
MD5
7837be000100873acd528a30c046e6a9
-
SHA1
977a8bfb16ba23729f7998f04410bc128336c56f
-
SHA256
e179b059329acc3c66d5a419d9b738c339ad10b076780183782e1ad5e13fcf1e
-
SHA512
ae638ecf7d49bbc92f538ca47320aaed2d508d9816aeadb0ef7f73edf6a2af9b25bca9b84fb7129ad22565668662a23de6d936c0d8ac171fadf0171d7741cbbd
-
SSDEEP
1536:ar5oaKuPsqDW68Jhnnw6TyEniZ89Tuq3w6h/+XolfmXFeq2:arCaK7qhkS6NM8Y96h2XimX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7837be000100873acd528a30c046e6a9_JaffaCakes118
Files
-
7837be000100873acd528a30c046e6a9_JaffaCakes118.exe windows:4 windows x86 arch:x86
8feedfb0ccf798dfc9cc47c7a58cb4d0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetCalendarInfoA
GetLastError
GetLocaleInfoW
GlobalCompact
InterlockedIncrement
IsDBCSLeadByteEx
TlsAlloc
WriteConsoleOutputAttribute
advapi32
BuildExplicitAccessWithNameA
CryptSignHashA
RegDeleteKeyW
RegRestoreKeyW
RegSetValueExW
ReportEventW
SetSecurityDescriptorDacl
user32
CheckMenuRadioItem
DefMDIChildProcA
DragDetect
EnumPropsExA
GetDlgItemTextW
GetKeyNameTextA
GetKeyNameTextW
PtInRect
RegisterLogonProcess
RegisterSystemThread
RegisterWindowMessageA
SetActiveWindow
SetMenuContextHelpId
SetMenuItemInfoA
UnregisterClassW
shell32
DragQueryFileW
ExtractAssociatedIconExA
OpenAs_RunDLLA
SHGetDataFromIDListA
SHInvokePrinterCommandA
SHLoadInProc
SheSetCurDrive
Shell_NotifyIcon
Sections
.text Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 51KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE