Static task
static1
Behavioral task
behavioral1
Sample
137ceb9cd349da052d66ed5de895db15_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
137ceb9cd349da052d66ed5de895db15_JaffaCakes118
-
Size
181KB
-
MD5
137ceb9cd349da052d66ed5de895db15
-
SHA1
57c7d21e5b8f722b877a4d66cb9d867807b73a64
-
SHA256
82c9d784e224862c480e6f0886f96a8b3eaaad76dd01afa27c6b3b5daa09cb12
-
SHA512
792769e6155f465cfeda5694dca8bc90e1f847d3679a66404178fcc3792078c0f7101d1bfca5cd5e198b9378645636d01f5e891739fa7e32bb79fa095f8362fb
-
SSDEEP
1536:wDUp6vyl7WrPwVnUkLXvPzD0zd7BgblLddh:w9tLMUk7zq1gb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 137ceb9cd349da052d66ed5de895db15_JaffaCakes118
Files
-
137ceb9cd349da052d66ed5de895db15_JaffaCakes118.exe windows:1 windows x86 arch:x86
9e7bbe72abc411372f33a6b42900cfe1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CloseHandle
SetFilePointer
WaitForSingleObject
EnterCriticalSection
HeapReAlloc
FormatMessageW
HeapAlloc
ReadFile
GetCurrentProcessId
HeapReAlloc
TerminateProcess
GetProcAddress
lstrlenW
GetModuleFileNameA
GetCurrentProcessId
user32
ReleaseCapture
MapWindowPoints
RegisterClassExW
PeekMessageW
wsprintfW
MessageBoxW
GetDesktopWindow
FindWindowW
DispatchMessageA
ScreenToClient
GetDlgItem
Sections
Size: 143KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�vmp0 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 512B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE