Static task
static1
Behavioral task
behavioral1
Sample
adc39a303e9f77185758587875097bb6_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
adc39a303e9f77185758587875097bb6_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
adc39a303e9f77185758587875097bb6_JaffaCakes118
-
Size
230KB
-
MD5
adc39a303e9f77185758587875097bb6
-
SHA1
134d9e732a33413519341e4947013e7c7e521415
-
SHA256
bfb8d13fcb64e3d09de2850b47d64492dbfc7bba58766546c1511f1fa59a64c9
-
SHA512
6db6ff0de121a8f41e51fa011f17d14c9910a57ccf5bcb0237879a9e15f6d1eda209c5bae969c8edf5874ce44f90c826919697694aae86768c6169044d982230
-
SSDEEP
6144:CpQpG5qElACE3GDOCG9FsEpkKBFaPwdgiCdp:8J5AGiC4DR3ao9Cdp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource adc39a303e9f77185758587875097bb6_JaffaCakes118
Files
-
adc39a303e9f77185758587875097bb6_JaffaCakes118.exe windows:6 windows x86 arch:x86
af22ee3739e889ee09e871ca4db2c725
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
LoadLibraryA
GetProcAddress
CloseHandle
GetEnvironmentVariableA
GetShortPathNameA
Sleep
GetCurrentProcess
lstrcatA
FreeLibrary
DeleteFileA
FindResourceA
SizeofResource
LoadResource
LockResource
GetTempPathA
DeleteCriticalSection
WriteFile
CreateThread
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
WriteConsoleW
HeapReAlloc
HeapSize
DecodePointer
RaiseException
GetLastError
CreateFileA
FindNextFileA
FindFirstFileExA
FindClose
GetModuleFileNameW
SetLastError
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ReadFile
CreateFileW
GetFileType
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
GetModuleFileNameA
GetACP
HeapFree
HeapAlloc
SetFilePointerEx
GetConsoleMode
ReadConsoleW
FlushFileBuffers
GetConsoleCP
SetStdHandle
SetEndOfFile
LCMapStringW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
GetCommandLineA
GetCommandLineW
InitializeCriticalSectionEx
user32
wsprintfA
advapi32
SystemFunction036
shell32
SHGetSpecialFolderPathA
ShellExecuteA
ShellExecuteExA
Sections
.text Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 232B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 115KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ