Static task
static1
Behavioral task
behavioral1
Sample
32e4c016d1d696904ae4d527d5f5e6e9_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
32e4c016d1d696904ae4d527d5f5e6e9_JaffaCakes118
-
Size
82KB
-
MD5
32e4c016d1d696904ae4d527d5f5e6e9
-
SHA1
da3d7874a7336b535dbcb22943a50ca121ca6329
-
SHA256
e2823aed7888a4df023166841e23b3c5be42f567cce14d07fde8cc14a622fe01
-
SHA512
2e04a91102e7488006526223780a8d475ff30b5a111d41d0f497c973bd13cab3de088d4acf2209454d42b6f4b834919c4df2291303504eebaa10d85d92fb713a
-
SSDEEP
1536:03v7ydQPV977Yz74PbyPPRoLkQ/DdGbMCRkBEYigvYEA:0fyQ9977PyRoQQLUMhYB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 32e4c016d1d696904ae4d527d5f5e6e9_JaffaCakes118
Files
-
32e4c016d1d696904ae4d527d5f5e6e9_JaffaCakes118.exe windows:4 windows x86 arch:x86
c180ca42e10123822d89b65728a3648b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
CloseHandle
WaitForSingleObject
ReadFile
PeekNamedPipe
CreateProcessA
CreatePipe
OutputDebugStringA
SetEndOfFile
SetEnvironmentVariableA
FindFirstFileA
FindClose
FileTimeToSystemTime
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
GetDriveTypeA
HeapFree
HeapAlloc
HeapReAlloc
GetCommandLineA
RaiseException
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
FlushFileBuffers
WriteFile
DeleteCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetACP
GetOEMCP
GetFullPathNameA
GetCurrentDirectoryA
HeapSize
SetStdHandle
SetFilePointer
HeapDestroy
VirtualFree
VirtualAlloc
GetModuleHandleA
WideCharToMultiByte
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
SetUnhandledExceptionFilter
GetTimeZoneInformation
IsBadCodePtr
CreateFileA
CompareStringA
CompareStringW
GetProcessHeap
VirtualAllocEx
esent
JetCreateIndex
dxtrans
DllGetClassObject
DllRegisterServer
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.zJ Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CmH Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.D Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cddOEW Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.URH Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 46KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qOJAJN Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ