Static task
static1
Behavioral task
behavioral1
Sample
36d210dfb1d00675f9e57c40da719684_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
36d210dfb1d00675f9e57c40da719684_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
36d210dfb1d00675f9e57c40da719684_JaffaCakes118
-
Size
56KB
-
MD5
36d210dfb1d00675f9e57c40da719684
-
SHA1
dc24df8a9bc2042f4a864f3b0b55e21e3d76b62e
-
SHA256
ce76d07c558d66bb5158d5c87023d5c75b17e76b99db31b72800de5cdd948a4b
-
SHA512
c2990d94c81eb7a25277e0ac0c257866bacc31a444d19437bd8d3646c530294e804ef0c5274e58d812c43d2eee7b12debdb0f8005e664e2e421d955bc50de756
-
SSDEEP
1536:7rlTQl251QW/xwiMaFP2kQHJvCc51JX6ABVFTYFpEWEqEbET:JQlyX/eiMaQNX6APyL3O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 36d210dfb1d00675f9e57c40da719684_JaffaCakes118
Files
-
36d210dfb1d00675f9e57c40da719684_JaffaCakes118.exe windows:4 windows x86 arch:x86
bd5e90c051129865e5ff1852e784f9db
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOEMCP
GetVersion
lstrcpynA
GetStdHandle
GetACP
LCMapStringW
GetStringTypeW
MultiByteToWideChar
CreateFileA
lstrcpyA
WriteFile
SetFilePointer
lstrcpynW
SetHandleCount
GetStartupInfoA
GetModuleFileNameA
GetCurrentProcess
GetCommandLineA
TerminateProcess
LCMapStringA
GetStringTypeA
GetFileType
user32
DrawTextW
LoadMenuA
DrawIconEx
GetWindowTextLengthA
IsMenu
GetFocus
GetMenu
LoadCursorA
DialogBoxParamA
GetCursor
advapi32
RegDeleteValueW
RegCreateKeyW
RegDeleteKeyA
RegSetValueW
RegOpenKeyA
RegQueryValueExA
RegEnumValueA
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 50KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 335B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ