Static task
static1
Behavioral task
behavioral1
Sample
a6633869dc2f831b73a6042bf70ebfe4_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
a6633869dc2f831b73a6042bf70ebfe4_JaffaCakes118
-
Size
39KB
-
MD5
a6633869dc2f831b73a6042bf70ebfe4
-
SHA1
b9d52ea99ef033089203d910d7d0ca2962d99063
-
SHA256
3263ef5986360cd734ebc23bc666150ee5ddebdbd4b4ca375ea3da0693dd98d6
-
SHA512
514ee33456c9efc289412e70c6cfe738488efac934f751eb0a083933539b43410f1e43af910fcf707c92ca4fd8f82bf75a088e46067a82f125d5c13c3e53f48f
-
SSDEEP
768:guFjU6BQyO9/XcTd80MgHbAZQJYQHHA5zkM4bn7zGhTgURSH:b6+80M4bAZjIAgb7zWOH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a6633869dc2f831b73a6042bf70ebfe4_JaffaCakes118
Files
-
a6633869dc2f831b73a6042bf70ebfe4_JaffaCakes118.exe windows:4 windows x86 arch:x86
dbd1be2761aba69c19b9ef74ff1309c1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
ResetEvent
InterlockedExchange
GetLocaleInfoA
ReleaseMutex
GetStdHandle
RaiseException
GlobalFree
LoadLibraryExA
GetCommandLineA
EnterCriticalSection
Sleep
SetEvent
GetACP
SetErrorMode
CloseHandle
GetSystemDirectoryA
GetLogicalDrives
HeapCreate
FindFirstFileA
GetLastError
user32
ShowWindow
GetFocus
IsIconic
GetActiveWindow
GetCursorPos
DrawTextA
FillRect
GetWindowTextA
GetParent
GetClassNameA
GetWindow
ReleaseDC
FrameRect
EndPaint
BeginPaint
wsprintfA
FlashWindowEx
SetForegroundWindow
ValidateRect
httpapi
HttpInitialize
HttpAddUrl
HttpTerminate
HttpCreateHttpHandle
HttpAddFragmentToCache
winhttp
WinHttpOpen
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 696KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ