Static task
static1
Behavioral task
behavioral1
Sample
d51abb551c3dbb0cadd193fecdd11907_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d51abb551c3dbb0cadd193fecdd11907_JaffaCakes118
-
Size
181KB
-
MD5
d51abb551c3dbb0cadd193fecdd11907
-
SHA1
ae0608255b7ad5ab42fc9bfc1313343b6441f4f4
-
SHA256
24b23830f1ec460e1b88f1ccc55c846316d8828598df6cff1c95fefa3ce7423f
-
SHA512
9faec5787bc97fbc87d101c9a438e042bcca370a585b8c6fe8b93dada3ba52aea8a1f393ae4d558ac8cc01cdef6de08b50d97797930da3735ba88a023a25507d
-
SSDEEP
1536:wDUp6vyl7WrPwVnUkLXvPzD0zd7BgblLddh:w9tLMUk7zq1gb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d51abb551c3dbb0cadd193fecdd11907_JaffaCakes118
Files
-
d51abb551c3dbb0cadd193fecdd11907_JaffaCakes118.exe windows:1 windows x86 arch:x86
9e7bbe72abc411372f33a6b42900cfe1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CloseHandle
SetFilePointer
WaitForSingleObject
EnterCriticalSection
HeapReAlloc
FormatMessageW
HeapAlloc
ReadFile
GetCurrentProcessId
HeapReAlloc
TerminateProcess
GetProcAddress
lstrlenW
GetModuleFileNameA
GetCurrentProcessId
user32
ReleaseCapture
MapWindowPoints
RegisterClassExW
PeekMessageW
wsprintfW
MessageBoxW
GetDesktopWindow
FindWindowW
DispatchMessageA
ScreenToClient
GetDlgItem
Sections
Size: 143KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�vmp0 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 512B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE