Static task
static1
Behavioral task
behavioral1
Sample
ba1eb4041729c166fdca676230753fd3_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
ba1eb4041729c166fdca676230753fd3_JaffaCakes118
-
Size
92KB
-
MD5
ba1eb4041729c166fdca676230753fd3
-
SHA1
836d4cfee006398e239861ca89d36fe7db8b8024
-
SHA256
4dcf35baf4c0a64ed61219e1a31b2cdf239b6cddef54b3c00f2cd3f113c551af
-
SHA512
047a29ece932fbd557e135c0b45ced1f5b72a80dd02628c64045fe9162be06b20b50d169d349b60f4255c567bceb42ed25c47d72eb4b3e15526f5575a99dba1b
-
SSDEEP
1536:Uh1z5s4Q8QjcmRBe6dXlTvdnppo624JwJS5BKDE0pldJW8GhJTYUR2UTpr69q:UXz6Z8606tFvhW6Z5YppDJWpnY62UT+q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ba1eb4041729c166fdca676230753fd3_JaffaCakes118
Files
-
ba1eb4041729c166fdca676230753fd3_JaffaCakes118.exe windows:5 windows x86 arch:x86
d45e5b21fcbfc0fe2227fed898b52a4d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowLongA
BeginPaint
CheckDlgButton
DispatchMessageA
GetClipboardOwner
EnableScrollBar
IsDlgButtonChecked
GetSystemMetrics
SetWindowTextA
EndPaint
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
gdi32
GetBkMode
Polygon
DeleteObject
GetStockObject
CreateHatchBrush
CreateSolidBrush
ole32
CoWaitForMultipleHandles
CoGetCurrentProcess
CoGetCancelObject
CoGetObjectContext
CoUnmarshalHresult
oleaut32
SafeArrayAllocDescriptor
SafeArrayDestroyDescriptor
kernel32
GetModuleHandleA
InterlockedDecrement
GetCommandLineA
GetFileAttributesA
HeapDestroy
InitializeCriticalSection
GetVersionExA
GetLastError
HeapAlloc
HeapCreate
QueryPerformanceCounter
HeapFree
DeleteCriticalSection
LeaveCriticalSection
GetStartupInfoA
GetACP
EnterCriticalSection
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE