Static task
static1
Behavioral task
behavioral1
Sample
a21996e7507aecf3e5c1097e625ef613_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
a21996e7507aecf3e5c1097e625ef613_JaffaCakes118
-
Size
83KB
-
MD5
a21996e7507aecf3e5c1097e625ef613
-
SHA1
683044866f8b944c1f4b3015bd1a9fcb6be249e3
-
SHA256
90a6f444631a57f20b1484e263356fc92cb847f453220b78296641a298a0ad10
-
SHA512
32698659d6e03a18e2d2cfde4f20c33e9de410e280565bc1951dc419f7a3ecc601a4c6411c9df43b4a350fc4157408df2dbbafce79c63a58ed230e54388b633a
-
SSDEEP
1536:F8qlby8l5rxA3NbFYQtiFE6JOq6mVqKLUO6RQdcxsHds/UPYCOfMRUzdW:F8qlbygA5FriFEc6bK4OCXs9oUR7mpW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a21996e7507aecf3e5c1097e625ef613_JaffaCakes118
Files
-
a21996e7507aecf3e5c1097e625ef613_JaffaCakes118.exe windows:4 windows x86 arch:x86
a510baa3ecd268c6c6bb7d395fef0aad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
shlwapi
StrToIntA
wvnsprintfA
kernel32
lstrcmpA
lstrcmpW
GetCommandLineW
GetModuleFileNameA
GetProcAddress
LoadLibraryA
ExitProcess
lstrlenA
lstrcpyA
GetModuleHandleA
user32
PostQuitMessage
DestroyWindow
PostMessageA
GetWindowTextA
DestroyIcon
DispatchMessageA
TranslateMessage
GetMessageA
GetCursorPos
CreateDialogParamA
RegisterWindowMessageA
EnumWindows
SetForegroundWindow
TrackPopupMenu
DestroyMenu
wsprintfA
MessageBoxA
CreatePopupMenu
LoadIconA
EnableMenuItem
InsertMenuA
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
shell32
CommandLineToArgvW
Shell_NotifyIconA
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 70KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE