Static task
static1
Behavioral task
behavioral1
Sample
5af9f8351c27c32d1c9d2179a34a0620_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
5af9f8351c27c32d1c9d2179a34a0620_JaffaCakes118
-
Size
849KB
-
MD5
5af9f8351c27c32d1c9d2179a34a0620
-
SHA1
b5046e105332a7fe6c71bd0f7d676158f30309f9
-
SHA256
e95cc70d8ce174cc2b28667e97552a26a91fcb7991d32a81fd23c9460af69af4
-
SHA512
436d353271c2e9a1282c89b84fca67d9f03891d0a4800902cd580fae071ff28aa361f2bdfd31bb207a84edc9d029a6257f8f8954f0092f033122dbd048adec62
-
SSDEEP
24576:o/QCXJSjgFOc433HWfFLj9kN+z9SprkSf2:F6Sjgp2m939kY90Lu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 5af9f8351c27c32d1c9d2179a34a0620_JaffaCakes118
Files
-
5af9f8351c27c32d1c9d2179a34a0620_JaffaCakes118.exe windows:4 windows x86 arch:x86
94400fe3e62cd2376124312fe435b8e4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
UpdateWindow
TranslateMessage
ShowWindow
SendMessageA
RegisterClassExA
PostQuitMessage
MessageBoxA
LoadIconA
LoadCursorA
GetMessageA
DispatchMessageA
DefWindowProcA
CreateWindowExA
kernel32
GetModuleHandleA
HeapAlloc
lstrlenA
lstrcpynA
lstrcpyA
lstrcatA
WriteFile
SizeofResource
SetFileAttributesA
RtlMoveMemory
LockResource
LoadResource
LoadLibraryA
CloseHandle
CreateFileA
ExitProcess
FindResourceA
FreeResource
GetCommandLineA
GetEnvironmentVariableA
GetFileSize
GetModuleFileNameA
GlobalFree
GetProcAddress
GetProcessHeap
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
GlobalAlloc
HeapFree
shlwapi
PathFindFileNameA
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 842KB - Virtual size: 841KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE