Static task
static1
Behavioral task
behavioral1
Sample
f8e7a29d85aa88cc07ec2011e4efbd3f_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f8e7a29d85aa88cc07ec2011e4efbd3f_JaffaCakes118
-
Size
93KB
-
MD5
f8e7a29d85aa88cc07ec2011e4efbd3f
-
SHA1
9831857bf83207661077edc9bfbfec31e23cc11c
-
SHA256
cecfca09ab9c90d77606e0f71f120e9f1fce51f26927536d003e5854efe588c9
-
SHA512
f2a2e1eb4424a742c04c25689115b620935067b478a638ec86400381044a547c88a5b22e74fe9b7b16d964c1d7460481825063517e117f96be1d1384298d8309
-
SSDEEP
1536:IcYx6lV43fK4APKAQjo2PrwUfzdQQlwY3/1HFkywSoUnMk1JDHTl/3zW3d6VBGXS:Ih4coRlGJfBQwFR0UdXB6rX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f8e7a29d85aa88cc07ec2011e4efbd3f_JaffaCakes118
Files
-
f8e7a29d85aa88cc07ec2011e4efbd3f_JaffaCakes118.exe windows:5 windows x86 arch:x86
d5d7d1f20cb2e69781b6fa5d5949203c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CheckDlgButton
LoadIconA
LoadCursorA
RegisterClassExA
IsDlgButtonChecked
EndPaint
GetWindowLongA
SetWindowTextA
EnableScrollBar
GetClipboardOwner
BeginPaint
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
gdi32
GetStockObject
DeleteObject
SetBkMode
PolyBezier
CreatePatternBrush
CreateBrushIndirect
ole32
CoGetStandardMarshal
OleSetContainedObject
CoUnmarshalHresult
CoWaitForMultipleHandles
StgIsStorageFile
CoGetObjectContext
oleaut32
SafeArrayAllocDescriptor
SafeArrayDestroyDescriptor
kernel32
GetCommandLineA
HeapDestroy
InterlockedDecrement
LeaveCriticalSection
QueryPerformanceCounter
EnterCriticalSection
InitializeCriticalSection
HeapAlloc
HeapCreate
GetFileAttributesA
GetACP
HeapFree
GetStartupInfoA
GetModuleHandleA
GetLastError
DeleteCriticalSection
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE