Static task
static1
Behavioral task
behavioral1
Sample
35aba5eedfb7a07774a75d049f4c59f7_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
35aba5eedfb7a07774a75d049f4c59f7_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
35aba5eedfb7a07774a75d049f4c59f7_JaffaCakes118
-
Size
517KB
-
MD5
35aba5eedfb7a07774a75d049f4c59f7
-
SHA1
674f6da723c78f901f000c5a722cc6c24600b3db
-
SHA256
b9cfb864b8f7cbc9993b47ff0b0d608f0b460ac94fb9f80f31c9ba27024139e0
-
SHA512
f166d49addbc8540934e859d4d6d471a32823b8343612e7846666485cc05e2c57fc3b78feb96c756c519db70c94297f6d77d018ebc8d68a985f5a5085eb9befa
-
SSDEEP
12288:YdD3/Fg51/lLAQEZXg7peTajuBrpi+9AQJwk7MYjI7:Yt39iHKRmpe3BNipywQMv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 35aba5eedfb7a07774a75d049f4c59f7_JaffaCakes118
Files
-
35aba5eedfb7a07774a75d049f4c59f7_JaffaCakes118.exe windows:4 windows x86 arch:x86
bbd2b1d65901e03b7c3125017004b94f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
LoadCursorA
DispatchMessageA
IsDialogMessageA
IsCharLowerA
GetWindowLongA
IsZoomed
IsWindow
PeekMessageA
PostMessageA
LoadImageA
SetCursorPos
SetFocus
GetWindowTextA
cabinet
FCIDestroy
DeleteExtractedFiles
Extract
FCICreate
acledit
EditOwnerInfo
SedSystemAclEditor
SedTakeOwnership
wtsapi32
WTSQueryUserConfigA
WTSVirtualChannelOpen
WTSVirtualChannelRead
WTSEnumerateProcessesA
WTSSetSessionInformationA
WTSOpenServerA
WTSSetUserConfigA
WTSCloseServer
WTSEnumerateServersA
WTSFreeMemory
WTSEnumerateSessionsA
WTSLogoffSession
WTSQueryUserToken
kernel32
GetDiskFreeSpaceA
CreateNamedPipeA
FoldStringW
DeviceIoControl
GetProcessHeap
GetFileSize
SetEndOfFile
GetModuleHandleA
SetFileAttributesA
CloseHandle
GetComputerNameA
VirtualQueryEx
GetCurrentDirectoryA
GetBinaryTypeA
InterlockedExchange
FindResourceA
InterlockedDecrement
GetAtomNameA
OpenFileMappingA
FormatMessageA
GetConsoleTitleA
GetTickCount
GetVolumePathNameA
GetProcessTimes
CompareStringA
GetShortPathNameA
HeapValidate
GetLogicalDrives
CreateSemaphoreA
lstrcpynA
ReplaceFileA
GetProcAddress
CreateMutexA
CreateTimerQueue
TlsGetValue
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 478KB - Virtual size: 478KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE