e:\nuisk\tm
Static task
static1
Behavioral task
behavioral1
Sample
31594db440fb2a2eef9f3169d92fc142_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
31594db440fb2a2eef9f3169d92fc142_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
31594db440fb2a2eef9f3169d92fc142_JaffaCakes118
-
Size
505KB
-
MD5
31594db440fb2a2eef9f3169d92fc142
-
SHA1
6464ff6c1292e45cbf5e55e97c2b057b1f829b0a
-
SHA256
45b7837302c457f1dac516d45daed700dcffede0a25a1342ea605d8476e60ecb
-
SHA512
ceb040b1e7789c40636d34a587d3802315bfd9fa0eab27a631274f5ece269bcebc125f2ffab11d743f918f44dd9d722a2c102f6cd8f5598f9860510f58c10b72
-
SSDEEP
12288:5ol4YdeXZOp0DikagYGOQgnOwjLk6xZMFHjJSiGoh:5olpd4ZUrRgY2gnOwjL9x+FHjIiGoh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 31594db440fb2a2eef9f3169d92fc142_JaffaCakes118
Files
-
31594db440fb2a2eef9f3169d92fc142_JaffaCakes118.exe windows:4 windows x86 arch:x86
b73dab59c48554b9465eed7488bee50c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegSetValueA
LookupPrivilegeNameA
RegLoadKeyA
RegSetValueExW
CryptGetUserKey
CryptAcquireContextW
RegCreateKeyA
RegRestoreKeyA
RegDeleteValueW
RegFlushKey
InitiateSystemShutdownA
CryptAcquireContextA
CryptVerifySignatureW
LookupAccountNameW
RegCreateKeyExW
RegQueryValueExW
CryptHashData
RegCloseKey
CryptEncrypt
CryptVerifySignatureA
user32
GetClassNameA
DlgDirSelectExW
ScrollDC
EnumPropsA
GetClassLongW
RegisterClassExA
LoadStringW
VkKeyScanA
LookupIconIdFromDirectory
RegisterClassA
ArrangeIconicWindows
kernel32
GetOEMCP
GetCurrentProcessId
WritePrivateProfileStringW
GetEnvironmentVariableW
LCMapStringW
TlsAlloc
WideCharToMultiByte
TlsGetValue
GetCommandLineA
CreateMutexA
TlsSetValue
GetDiskFreeSpaceW
FreeEnvironmentStringsA
GetLocaleInfoW
RtlUnwind
GetSystemDefaultLangID
EnumDateFormatsW
LeaveCriticalSection
DeleteCriticalSection
GetCPInfo
GetModuleHandleW
GetACP
GlobalAddAtomA
FlushFileBuffers
SetStdHandle
GetStringTypeA
GetFileType
VirtualFree
TerminateProcess
IsValidCodePage
LoadLibraryA
EnterCriticalSection
GetTickCount
SetCurrentDirectoryW
GetCurrentThread
InterlockedExchange
SetLastError
GetModuleFileNameA
OpenMutexA
QueryPerformanceCounter
WriteFile
GetSystemTimeAsFileTime
CloseHandle
GetLastError
GetStringTypeW
HeapReAlloc
GetStartupInfoA
CompareStringA
SetComputerNameA
SetFilePointer
VirtualAlloc
FileTimeToLocalFileTime
HeapFree
InitializeCriticalSection
VirtualProtect
GetLocaleInfoA
GetUserDefaultLCID
SetHandleCount
GetEnvironmentStrings
GetSystemInfo
GetCurrentProcess
IsValidLocale
CompareStringW
GetTimeZoneInformation
GetStdHandle
HeapSize
TlsFree
MoveFileExW
HeapAlloc
FreeEnvironmentStringsW
SetEnvironmentVariableA
VirtualQuery
GetDateFormatA
WaitNamedPipeA
GetEnvironmentStringsW
LCMapStringA
GetTimeFormatA
GetCurrentThreadId
GetModuleHandleA
HeapDestroy
HeapCreate
SetConsoleCursorPosition
ExitProcess
EnumSystemLocalesA
GetThreadPriorityBoost
ReadFile
MultiByteToWideChar
GetCurrencyFormatA
GetProcAddress
IsBadWritePtr
GetVersionExA
UnhandledExceptionFilter
GetComputerNameW
comctl32
InitCommonControlsEx
Sections
.text Size: 353KB - Virtual size: 352KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ