fsgjhghjfdFADZxcRFTg
Static task
static1
Behavioral task
behavioral1
Sample
3062a26e27196137496909cd884b9adb_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
3062a26e27196137496909cd884b9adb_JaffaCakes118
-
Size
188KB
-
MD5
3062a26e27196137496909cd884b9adb
-
SHA1
9ca8bdafcfd6e5e6204125119b675cc855ff00c8
-
SHA256
1bd02412be82153e7175f092d645cb0957a796d1cf786efc9268337374cc5d63
-
SHA512
ffbe013201f10eaceff35123c7ab973b934b4bfa04a02153abd6da88aecd6d86969d59f8bef353580dda151eebb5be4635f97ca482f6efef3b2e24d65b3d8a04
-
SSDEEP
3072:h7pI7kZNb+M4zcDufZ28zDLYGL1BBRpzkaagwqUnIauUu/e:h7dfb+M8R28HLYGxRpzkw1Un9u/e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3062a26e27196137496909cd884b9adb_JaffaCakes118
Files
-
3062a26e27196137496909cd884b9adb_JaffaCakes118.exe windows:4 windows x86 arch:x86
0c02dc405eb4428f7787a1883dd7568c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
SetFileSecurityW
gdi32
CreateFontA
DeleteObject
kernel32
AddAtomA
CloseHandle
CreateDirectoryA
CreateMutexA
CreateSemaphoreA
DeleteCriticalSection
EnterCriticalSection
FindAtomA
GetAtomNameA
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryW
MultiByteToWideChar
QueryPerformanceCounter
ReleaseMutex
ReleaseSemaphore
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
msvcrt
_write
__dllonexit
__getmainargs
__initenv
__lconv_init
__mb_cur_max
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_errno
_fmode
_initterm
_iob
_lock
_onexit
_unlock
abort
atoi
calloc
exit
fputc
fputs
free
fwrite
getenv
localeconv
malloc
memcmp
memcpy
memset
printf
realloc
setlocale
signal
sprintf
strchr
strcmp
strcpy
strerror
strlen
strncmp
wcslen
shell32
SHBrowseForFolderA
SHGetMalloc
SHGetPathFromIDListA
user32
CallWindowProcA
CreateWindowExA
DialogBoxParamA
EnableWindow
EndDialog
FindWindowExA
GetClientRect
GetParent
GetWindowTextA
MessageBoxA
SendMessageA
SetWindowLongA
SetWindowTextA
Exports
Exports
Sections
.text Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 84B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 220B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ