Static task
static1
Behavioral task
behavioral1
Sample
0228ffd67b05a27d8910eb82c96772b9_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
0228ffd67b05a27d8910eb82c96772b9_JaffaCakes118
-
Size
164KB
-
MD5
0228ffd67b05a27d8910eb82c96772b9
-
SHA1
6d8a030806f4dfd45976cadb75ffacc412cddc6c
-
SHA256
110e7fca3bc26811b2ac14ea86fae3463d0e7404f766c7b3f46a83fd9a288770
-
SHA512
33e4eb84bd805cf47981c4d65930d97497212f1bbf316152cc766567c42051ed6c6838f16bd5b0f3a2d9346c9a6aae296479cab0b2bfbc52e432b50589f19f59
-
SSDEEP
768:Y40GcbPTZN1V0pa0KoJkyWR8+0TcQUPf00uDLwXhEFjIfRwSkKUnh8g9/7:T0GuPTdmp3kBgiqQXO4BkXfB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0228ffd67b05a27d8910eb82c96772b9_JaffaCakes118
Files
-
0228ffd67b05a27d8910eb82c96772b9_JaffaCakes118.exe windows:1 windows x86 arch:x86
807390fa07bfb644b30b34bf40d86117
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsDialogMessageW
PeekMessageW
LoadMenuW
SendMessageW
GetDC
SendDlgItemMessageW
KillTimer
DestroyWindow
SetRect
DispatchMessageA
IsIconic
PeekMessageW
IsDlgButtonChecked
DestroyWindow
EnableMenuItem
LoadAcceleratorsW
IsDlgButtonChecked
GetCursorPos
GetParent
GetMenu
KillTimer
DispatchMessageW
SetWindowLongW
SetTimer
BeginPaint
BeginPaint
EndDialog
OffsetRect
DispatchMessageA
CallWindowProcW
LoadStringW
GetClientRect
UpdateWindow
SendMessageA
MoveWindow
FillRect
UpdateWindow
SendDlgItemMessageW
MapWindowPoints
DestroyWindow
WinHelpW
wsprintfW
MoveWindow
GetParent
ReleaseCapture
SendMessageA
DefWindowProcW
GetMenu
LoadImageW
RegisterClassW
GetMessageW
IsWindow
GetClientRect
LoadStringW
GetClientRect
MessageBoxA
EndPaint
SendMessageW
GetClientRect
GetWindowTextW
wsprintfA
SendMessageW
DestroyMenu
GetSystemMenu
CreateDialogParamW
KillTimer
kernel32
GetTickCount
HeapFree
LocalFree
ExitProcess
SetLastError
MultiByteToWideChar
GetProcAddress
WideCharToMultiByte
LoadLibraryA
LoadLibraryA
SetEvent
TerminateProcess
SetFilePointer
GetCurrentThreadId
WriteFile
SetUnhandledExceptionFilter
LeaveCriticalSection
GetCommandLineA
FormatMessageW
Sections
Size: 143KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�vmp0 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 512B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 512B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 512B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 512B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 512B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE