Static task
static1
Behavioral task
behavioral1
Sample
28c1720d4d772af18810231f26d8300b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28c1720d4d772af18810231f26d8300b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
28c1720d4d772af18810231f26d8300b_JaffaCakes118
-
Size
122KB
-
MD5
28c1720d4d772af18810231f26d8300b
-
SHA1
e350a9bb8cba5c797d846765974b7db2c0955b38
-
SHA256
a65736e067580135c811b8e7a014ab554402428a2a9ba319b55939b0fa86667c
-
SHA512
4f79d9aa6c82a8565c69ec0e9ef538e0d84558d8276da677458c21e3bed9027045a56853913aa37e4fcce6e087c8b3f35743dbe5876016a9158d317d120be8b3
-
SSDEEP
3072:8TpmdDyXDc4IOHqnJRvrb/nnbcueMHjNiyCVK5M:KpmkDKPffnbcuYi5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 28c1720d4d772af18810231f26d8300b_JaffaCakes118
Files
-
28c1720d4d772af18810231f26d8300b_JaffaCakes118.exe windows:1 windows x86 arch:x86
9fda945c5d02e73d926c5e662b9b3161
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CompareFileTime
GetDiskFreeSpaceA
GetExitCodeProcess
GetFileSize
GetLastError
GetModuleHandleA
GetProcAddress
GetTickCount
LoadLibraryA
SearchPathA
Sleep
UnmapViewOfFile
VirtualAlloc
VirtualFree
lstrcatA
lstrcmpA
lstrlenA
gdi32
CreateBrushIndirect
CreateFontIndirectA
DeleteObject
GetDeviceCaps
SetBkColor
SetTextColor
user32
AppendMenuA
EndDialog
EqualRect
FindWindowExA
GetMenu
GetMessagePos
InvalidateRect
IsCharUpperA
LoadCursorA
PostQuitMessage
ScreenToClient
SetCaretPos
TrackPopupMenuEx
Sections
.data Size: 115KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspr Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE