c:\fulk\rqs
Static task
static1
Behavioral task
behavioral1
Sample
15a4f39942a9e8a57a377d4ad3eb8677_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15a4f39942a9e8a57a377d4ad3eb8677_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
15a4f39942a9e8a57a377d4ad3eb8677_JaffaCakes118
-
Size
492KB
-
MD5
15a4f39942a9e8a57a377d4ad3eb8677
-
SHA1
d2f54ce0b2171a3db14a825d427b9703d9152f71
-
SHA256
57021ec0adeea21bdc03b52baf364b238f6c6d36c29e741040e20875a1e8f977
-
SHA512
e13f9505a1925fbebec9292c678d1f8af3f36b540b8426e86041af306a7b9b4f5418ba075a3a8b30dd258b5cf5cb555b5118c8dafd25768d4b8e4b3517a29adc
-
SSDEEP
12288:pet0vaHI8Iin71qZeJcM7ENey9551xWmposPL+oHg:p4waHI78q0il9551xAq6o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 15a4f39942a9e8a57a377d4ad3eb8677_JaffaCakes118
Files
-
15a4f39942a9e8a57a377d4ad3eb8677_JaffaCakes118.exe windows:4 windows x86 arch:x86
72ca5cdc704e6e4ee858e2ff370baf1a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetEnvironmentVariableA
VirtualFree
HeapAlloc
GetTickCount
GetModuleFileNameW
GetEnvironmentStringsW
MultiByteToWideChar
SetFilePointer
InterlockedExchange
lstrcmpW
TlsSetValue
DeleteCriticalSection
TlsAlloc
FlushFileBuffers
SetLastError
DosDateTimeToFileTime
LoadLibraryA
GetProcAddress
TlsFree
ExitProcess
WriteFile
GetDateFormatA
RtlUnwind
GetEnvironmentStrings
GetStartupInfoW
FileTimeToLocalFileTime
FreeEnvironmentStringsW
GetSystemInfo
GetCommandLineW
GetOEMCP
GetLocaleInfoA
CompareStringW
IsBadWritePtr
InitializeCriticalSection
MapViewOfFile
SetStdHandle
GetCompressedFileSizeA
GetVersionExA
VirtualProtect
HeapSize
GetLastError
FreeEnvironmentStringsA
LCMapStringA
CloseHandle
GetCurrentThread
GetStartupInfoA
IsValidCodePage
GetSystemTimeAsFileTime
VirtualQuery
TlsGetValue
SetHandleCount
CompareStringA
WideCharToMultiByte
GetCPInfo
GetStdHandle
HeapCreate
HeapReAlloc
GetTimeZoneInformation
VirtualAlloc
HeapFree
IsValidLocale
EnumSystemLocalesA
EnterCriticalSection
LCMapStringW
GetCurrentProcess
GetStringTypeW
FindResourceW
GetCurrentThreadId
OpenFile
UnhandledExceptionFilter
GetACP
GetStringTypeA
GetModuleFileNameA
LeaveCriticalSection
GetCommandLineA
GetFileType
ReadFile
GetUserDefaultLCID
TerminateProcess
OpenMutexA
GetCurrentProcessId
GetTempPathW
GetTimeFormatA
SetConsoleOutputCP
CreateMutexA
DeleteFiber
GetModuleHandleA
GetLocaleInfoW
HeapDestroy
QueryPerformanceCounter
comctl32
InitCommonControlsEx
user32
DdeImpersonateClient
LoadStringA
RegisterClassExA
PostMessageW
GetWindowPlacement
DdeDisconnectList
RegisterClassA
GetMessageTime
InflateRect
TrackPopupMenu
WINNLSGetIMEHotkey
SetScrollRange
ChildWindowFromPoint
GetMonitorInfoW
IsChild
ShowWindow
GetMenuState
DestroyAcceleratorTable
DrawTextW
SendMessageTimeoutW
RegisterClassW
DrawTextA
CallWindowProcW
GetGuiResources
WaitMessage
gdi32
GetRgnBox
GetCharABCWidthsFloatW
SetPixelV
CreatePatternBrush
GetROP2
SetWorldTransform
GetTextExtentPointW
SetGraphicsMode
OffsetRgn
GetDeviceCaps
RoundRect
AnimatePalette
TextOutW
GetWinMetaFileBits
SelectClipPath
GetColorAdjustment
GetCharacterPlacementW
GetCharABCWidthsW
AddFontResourceA
CreateFontA
EnumICMProfilesW
GetFontLanguageInfo
GetClipBox
GetTextCharacterExtra
Sections
.text Size: 343KB - Virtual size: 343KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ