c:\pmv
Static task
static1
Behavioral task
behavioral1
Sample
e983c9a855678bf05c677d7bdd9fc48b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e983c9a855678bf05c677d7bdd9fc48b_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e983c9a855678bf05c677d7bdd9fc48b_JaffaCakes118
-
Size
308KB
-
MD5
e983c9a855678bf05c677d7bdd9fc48b
-
SHA1
b340fe72b1476b953f2ce42af27d3f4f0098465a
-
SHA256
5cd8fb26cdff51a95f0c89a5e8ce2096bf8ef7f7fe59a5aeade9f3dc7fa1be35
-
SHA512
5f6242f8eb0af1b629be5e7bec7111ed2f7e0c41ea62de7ba03d3e95f3ee5f5e66a4bb38b6c27064ce9bdc639293918418abb3209461bf927fbc7685f126c423
-
SSDEEP
6144:Zpn20QePEHdY0T3wJAaFOnGXCxWUEza1Gtj36eolia7:ZpJZcHYyaQGXxa1+r6eWis
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e983c9a855678bf05c677d7bdd9fc48b_JaffaCakes118
Files
-
e983c9a855678bf05c677d7bdd9fc48b_JaffaCakes118.exe windows:4 windows x86 arch:x86
c09584089eaa861c6035178610d63a76
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
MultiByteToWideChar
GetStartupInfoA
CopyFileA
ExitProcess
SetFileTime
LeaveCriticalSection
DeleteCriticalSection
HeapDestroy
HeapCreate
ReadFile
RtlUnwind
TlsGetValue
WideCharToMultiByte
CreateMutexA
FreeEnvironmentStringsA
VirtualAllocEx
CreateMailslotA
GetVersion
MoveFileExW
SetFilePointer
LoadLibraryA
SetConsoleTextAttribute
WaitNamedPipeA
SetLastError
HeapFree
GetLastError
GetTickCount
DebugBreak
GetStdHandle
GetSystemTimeAsFileTime
LoadLibraryExA
GetModuleFileNameA
GetCurrentProcess
GetVolumeInformationW
GetEnvironmentStringsA
LocalUnlock
FreeEnvironmentStringsW
CreateSemaphoreW
GetCPInfo
GetCurrentThreadId
GetCurrentThread
VirtualQuery
GetConsoleScreenBufferInfo
WriteFile
GetLocalTime
LCMapStringA
HeapAlloc
VirtualAlloc
GetACP
GetDiskFreeSpaceW
GetTimeZoneInformation
SetEndOfFile
TlsFree
GetFileType
GetCurrentProcessId
GetProcAddress
SetComputerNameW
CompareStringW
CommConfigDialogA
GetTempPathW
SetConsoleMode
QueryPerformanceCounter
GetConsoleTitleA
EnterCriticalSection
UnhandledExceptionFilter
TerminateProcess
CloseHandle
GlobalHandle
GetEnvironmentStringsW
InitializeCriticalSection
FlushFileBuffers
TlsAlloc
OpenMutexA
SetEnvironmentVariableA
CompareStringA
GetPrivateProfileSectionNamesA
LCMapStringW
InterlockedIncrement
GetCommandLineA
GetModuleHandleA
CreateProcessW
GetSystemTime
UnlockFile
HeapReAlloc
GetWindowsDirectoryA
GetNamedPipeHandleStateW
GetStringTypeA
WriteConsoleInputA
GetStringTypeW
GetDiskFreeSpaceExA
GetEnvironmentStrings
InterlockedExchange
GetDriveTypeW
GetOEMCP
GlobalUnlock
InterlockedDecrement
SetStdHandle
TlsSetValue
VirtualFree
SetHandleCount
IsBadWritePtr
user32
LoadMenuIndirectA
GetClassLongA
GetWindowThreadProcessId
DlgDirListW
GetScrollRange
RegisterClassA
GetMenu
ExcludeUpdateRgn
DdeQueryStringW
DispatchMessageW
IsCharUpperA
IsDialogMessageW
LoadIconA
CopyRect
RegisterClassExA
CheckDlgButton
GetNextDlgTabItem
WaitMessage
DefFrameProcW
PeekMessageA
DdeAddData
GetDlgItem
ClientToScreen
CloseWindowStation
LoadImageA
GetClipboardFormatNameW
VkKeyScanW
SetDoubleClickTime
GetKeyboardLayoutList
InvalidateRect
LoadStringW
SetClassLongA
DrawFocusRect
DestroyIcon
ChangeDisplaySettingsA
RegisterWindowMessageW
InternalGetWindowText
comctl32
InitCommonControlsEx
ImageList_Write
CreatePropertySheetPage
DrawStatusText
ImageList_GetIcon
ImageList_AddMasked
Sections
.text Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ