Static task
static1
Behavioral task
behavioral1
Sample
a29f2b5c5e407f21066ee4d6182c9a55_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
a29f2b5c5e407f21066ee4d6182c9a55_JaffaCakes118
-
Size
93KB
-
MD5
a29f2b5c5e407f21066ee4d6182c9a55
-
SHA1
886b2dd06975b122f885a0524d2f935a35d8e543
-
SHA256
0a011b94a288a5c595db15766d1a003f4b5a3a70b19c0296ce84de637396424e
-
SHA512
3d9401c4da730e75a02c37fc08266841e181e7028c3ca2e98ed342a2bf9fb6c93422ee03f5e59204fb78ced4e4045935642c1bfc775cee9775878fc06dfd3d2d
-
SSDEEP
1536:RhNyFAVnE+Fsu2+oWpDCH73hWuS2sdJLG7OTrJ+/zqXUxB+b8sJhvA:R7mgBzouGHb42OTd8yUK4sDA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a29f2b5c5e407f21066ee4d6182c9a55_JaffaCakes118
Files
-
a29f2b5c5e407f21066ee4d6182c9a55_JaffaCakes118.exe windows:5 windows x86 arch:x86
45187238cd0963c048dbbc9f47f266a0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CheckDlgButton
GetClipboardOwner
LoadIconA
EndPaint
IsDlgButtonChecked
EnableScrollBar
GetWindowLongA
LoadCursorA
RegisterClassExA
BeginPaint
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
SetWindowTextA
gdi32
SetBkMode
CreateBrushIndirect
DeleteObject
PolyBezier
GetStockObject
CreatePatternBrush
ole32
CoWaitForMultipleHandles
OleSetContainedObject
CoGetObjectContext
StgIsStorageFile
CoUnmarshalHresult
oleaut32
SafeArrayAllocDescriptor
SafeArrayDestroyDescriptor
kernel32
QueryPerformanceCounter
InterlockedDecrement
HeapFree
HeapDestroy
GetFileAttributesA
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapCreate
GetACP
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetLastError
InitializeCriticalSection
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE