Static task
static1
Behavioral task
behavioral1
Sample
f070bdf985c81a3f5141c2bacb45fc22_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f070bdf985c81a3f5141c2bacb45fc22_JaffaCakes118
-
Size
181KB
-
MD5
f070bdf985c81a3f5141c2bacb45fc22
-
SHA1
844a49d6cc6935a8471bdc0283a89a27f99090b3
-
SHA256
8452a7e5f3a23666ab1d30e605cafdd273d0f4ec9a8210448adebb846d0071f9
-
SHA512
7292328e0583ddb24000d260805898fa94d5ff2d10d033cdaa280579d411a39808fbf6915f5191d28bc2df1dbdccd7e6ddc7b373b1f63f6a3508d19408030b28
-
SSDEEP
3072:mat//VUWIFxAPY1tXPpy2hA7BwDAX1+Deh/4j9IJunF8ieRiDQ3PSpDo+cC+Ae:mapVuoPY1XA7BwDYAj5ZOeug9C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f070bdf985c81a3f5141c2bacb45fc22_JaffaCakes118
Files
-
f070bdf985c81a3f5141c2bacb45fc22_JaffaCakes118.exe windows:4 windows x86 arch:x86
e6967e17e81f4b6ea892aede3838c64e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SendMessageA
GetDlgItem
IsWindow
CreateWindowExW
DestroyWindow
EnumChildWindows
GetWindowThreadProcessId
ole32
CoGetMalloc
CoSetProxyBlanket
CoInitializeEx
CoTaskMemFree
CoCreateInstance
CoInitializeSecurity
CoQueryProxyBlanket
CoUninitialize
StringFromGUID2
kernel32
GetCalendarInfoW
ExitProcess
GetOEMCP
IsValidCodePage
VirtualFree
GetCPInfo
RtlUnwind
HeapDestroy
GetStartupInfoA
LeaveCriticalSection
InitializeCriticalSection
ReadFile
HeapCreate
EnumResourceNamesA
SetFilePointer
FreeEnvironmentStringsA
GetACP
DeleteCriticalSection
HeapReAlloc
VirtualAlloc
EnterCriticalSection
RaiseException
SetEndOfFile
HeapSize
SetEnvironmentVariableA
rpcrt4
UuidCreate
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ