Static task
static1
Behavioral task
behavioral1
Sample
ff96a6519743fee8161100691459ae27_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ff96a6519743fee8161100691459ae27_JaffaCakes118
-
Size
93KB
-
MD5
ff96a6519743fee8161100691459ae27
-
SHA1
a0d99e73e02b9f1418e5c2b8398659b60287d570
-
SHA256
8d3f322c4fe6b68ee843c52fe99f865fba7049d6d323370c306a74374a52be3f
-
SHA512
69d4e6a9529b008031075ca7d79606a86fdfd10be073d2e2221af4e8c32834065fe3b9bc8f66218fb820217789c87111d8dac99d148b883d19e62ed80ec9039c
-
SSDEEP
1536:IhHJyrQqf2SO/9OspYyyuhXmENBvcfx+Y57Ktj42vwMQ0kcT+pfhmJ2cmBR:CHJaY/Ms6uIEcfxXWhoppk2pBR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ff96a6519743fee8161100691459ae27_JaffaCakes118
Files
-
ff96a6519743fee8161100691459ae27_JaffaCakes118.exe windows:5 windows x86 arch:x86
70d1071f3a9060b4b16c98d3947d3466
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsDlgButtonChecked
EnableScrollBar
LoadIconA
EndPaint
GetClipboardOwner
SetWindowTextA
CheckDlgButton
LoadCursorA
RegisterClassExA
GetWindowLongA
BeginPaint
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
gdi32
GetStockObject
CreatePatternBrush
SetBkMode
DeleteObject
CreateBrushIndirect
PolyBezier
ole32
CoUnmarshalHresult
OleSetContainedObject
StgIsStorageFile
CoGetObjectContext
CoWaitForMultipleHandles
oleaut32
SafeArrayAllocDescriptor
SafeArrayDestroyDescriptor
kernel32
GetACP
GetFileAttributesA
LeaveCriticalSection
DeleteCriticalSection
HeapDestroy
GetStartupInfoA
GetLastError
HeapAlloc
HeapCreate
EnterCriticalSection
InitializeCriticalSection
InterlockedDecrement
HeapFree
GetCommandLineA
QueryPerformanceCounter
GetModuleHandleA
Sections
.text Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE