Static task
static1
Behavioral task
behavioral1
Sample
1257ac41850e830e07a6099715d8c720_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
1257ac41850e830e07a6099715d8c720_JaffaCakes118
-
Size
123KB
-
MD5
1257ac41850e830e07a6099715d8c720
-
SHA1
ad5c55752bd3e6dff46799b441d999bc25d8d013
-
SHA256
0820a90d0cb2f34237dffa504c8a150b07d58dd32c57e704e488b9fa071fb8f4
-
SHA512
7bc763a2949d3007973fea97b73c88f53e941fcd2ffd1e3518609c6acff0ecd04fda908a18fef4ff209a2509d1bb5a250c26035f5574d47427134ea5fb1359aa
-
SSDEEP
3072:Jp4QhJsxXYClfk6y6SyBgKGg/C2p6ztO73KpfsMhpql:sQhCpBOKQg3p6zQ7Wf2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1257ac41850e830e07a6099715d8c720_JaffaCakes118
Files
-
1257ac41850e830e07a6099715d8c720_JaffaCakes118.exe windows:4 windows x86 arch:x86
8687bfeaf619ab29d0a4f78354bb866b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_except_handler3
kernel32
ExitProcess
WaitForSingleObject
CreateThread
lstrcatA
GetLastError
CreateMutexA
lstrcmpA
lstrcpyA
GetModuleFileNameA
lstrlenA
LoadLibraryA
GetCommandLineA
WriteProcessMemory
lstrlenW
GetModuleFileNameW
Sleep
ReadProcessMemory
GetModuleHandleA
GetCurrentProcess
IsDebuggerPresent
lstrcmpiA
GetProcAddress
HeapFree
GetEnvironmentVariableA
HeapAlloc
GetStartupInfoA
GetProcessHeap
FreeConsole
user32
UpdateWindow
GetSysColor
TrackPopupMenu
MessageBoxW
GetWindowRect
SetWindowLongA
DefWindowProcA
SetTimer
TranslateMessage
gdi32
CreateDIBitmap
DeleteDC
comdlg32
ChooseFontA
PrintDlgA
shell32
SHGetFileInfoA
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ