Static task
static1
Behavioral task
behavioral1
Sample
32b96c1ce13ae6ed1aefbafc94df14bb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
32b96c1ce13ae6ed1aefbafc94df14bb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
32b96c1ce13ae6ed1aefbafc94df14bb_JaffaCakes118
-
Size
79KB
-
MD5
32b96c1ce13ae6ed1aefbafc94df14bb
-
SHA1
5a376be71c05ac915c08061c3b7d45620fa0c957
-
SHA256
965263d948c22b2fae110cbd78c69fde06933b02ff77c64474b510813b4c977e
-
SHA512
f08705c6739ae7cb71fb4cb9bf90db270935cacadcfca34ead31f0c4d67d18ab06e5e292c55135a9c6fd4bb77e7fee58439f94a3fa046789e057020acba8b4d4
-
SSDEEP
1536:y3WazOHy8AOiGc0QizrtNQ5ZBubG7wT/JX+43wE2Zlro:uUAOiGc0Qi/c4G7I/JX+4Lqlro
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 32b96c1ce13ae6ed1aefbafc94df14bb_JaffaCakes118
Files
-
32b96c1ce13ae6ed1aefbafc94df14bb_JaffaCakes118.exe windows:4 windows x86 arch:x86
68b3aeebfc5f020c12d4971366fb9030
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
GetUserNameA
InitializeSecurityDescriptor
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetKeySecurity
RegSetValueExA
SetSecurityDescriptorDacl
kernel32
CreateDirectoryA
CreateMutexA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FreeLibrary
GetCommandLineA
GetComputerNameA
GetEnvironmentVariableA
GetLastError
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDirectoryA
GetVersionExA
GetWindowsDirectoryA
InitializeCriticalSection
InterlockedExchange
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
WideCharToMultiByte
msvcrt
__getmainargs
__lc_codepage
__mb_cur_max
__p___argv
__p__environ
__p__fmode
__set_app_type
_cexit
_errno
_iob
_onexit
_setmode
_winmajor
abort
atexit
calloc
exit
fclose
fflush
fopen
fputc
fputs
fread
free
fseek
ftell
fwrite
getc
getenv
localeconv
malloc
memcpy
memset
perror
printf
putc
puts
remove
signal
strcat
strcpy
strlen
strncat
strncmp
strrchr
vfprintf
wcslen
shell32
ShellExecuteA
user32
CallNextHookEx
DispatchMessageA
GetAsyncKeyState
GetKeyState
GetKeyboardLayoutNameA
GetMessageA
SetWindowsHookExA
TranslateMessage
UnhookWindowsHookEx
ws2_32
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
htons
recv
select
send
socket
Sections
.text Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 616B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 512B - Virtual size: 220B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 6KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE