Static task
static1
Behavioral task
behavioral1
Sample
10ebfc8b68086fec3ba951ef3bf6966c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
10ebfc8b68086fec3ba951ef3bf6966c_JaffaCakes118
-
Size
120KB
-
MD5
10ebfc8b68086fec3ba951ef3bf6966c
-
SHA1
c9ce05b39fefe27bf7ec1ad2112f19228a9423e5
-
SHA256
768d8ff54351aacbe5f3dd7a2cbfd208cd50428bc7ce45b143dd44bd7df64449
-
SHA512
842f9615e34772882693dc8222bba8a00ce58d9531713a9c7815335fc9a78505d2acbf10518d627eec192ddd3ac3d0b7f4e2f660d44822f01f85f55024944a23
-
SSDEEP
3072:wcz90pPAoK6XG9fnaL6I5H45UybwAm94q:wcB0p48ifnJIafwAmmq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10ebfc8b68086fec3ba951ef3bf6966c_JaffaCakes118
Files
-
10ebfc8b68086fec3ba951ef3bf6966c_JaffaCakes118.exe windows:4 windows x86 arch:x86
c6c8f9a2cdd71e1c6c79ef1d131b23b6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
CreateProcessA
HeapCreate
GetCurrentDirectoryA
SetLastError
FindResourceW
LocalFree
CreateFileW
UnmapViewOfFile
GetComputerNameA
GetModuleHandleA
Sleep
CloseHandle
lstrcpyA
GetCurrentThreadId
GlobalUnlock
lstrlenA
LoadLibraryExW
FindClose
PulseEvent
user32
IsWindow
GetDlgItem
DrawEdge
GetDC
FillRect
GetCaretPos
CreateWindowExA
CallWindowProcA
CheckRadioButton
SetFocus
DispatchMessageA
DrawMenuBar
CreateIcon
rsaenh
CPGenKey
CPDecrypt
CPSignHash
CPHashData
CPDeriveKey
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 50KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cccilpw Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE