k:\
Static task
static1
Behavioral task
behavioral1
Sample
34c94bc5c59c531eedddbf34d259301f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
34c94bc5c59c531eedddbf34d259301f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
34c94bc5c59c531eedddbf34d259301f_JaffaCakes118
-
Size
592KB
-
MD5
34c94bc5c59c531eedddbf34d259301f
-
SHA1
47a31901b6c8de02d9d633cfb061dadc4b0533ab
-
SHA256
a8f896fccc10a8a8aaf485fda1048b22dd2162f539783858c7a43aa32afd9418
-
SHA512
6d601ffcb95b3b6f19ac7abf96b17fc32d7467412e7e521207ee98fe017da10a9897211ffe970e755bef4fd878279fd05262941784a9de9cca3d5d79e5be7e39
-
SSDEEP
12288:4Myjwl93KJCtgNXf6nFbjEMfN/bYtC+bo4VzgtJjyDX8onb:Diw2JCCXf6nF/7xbY46gqjnb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 34c94bc5c59c531eedddbf34d259301f_JaffaCakes118
Files
-
34c94bc5c59c531eedddbf34d259301f_JaffaCakes118.exe windows:4 windows x86 arch:x86
024d8d52c178432e6640372448fbae2e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcAddress
GetFileType
GetLocalTime
FreeEnvironmentStringsA
FlushFileBuffers
GetCurrentThread
VirtualFree
WriteFile
GetStartupInfoA
GetModuleFileNameW
GetEnvironmentStrings
HeapFree
FileTimeToDosDateTime
TlsAlloc
SetHandleCount
lstrcmpW
GetTickCount
ExitProcess
VirtualAlloc
GetStdHandle
GetCPInfo
RtlUnwind
OpenMutexA
InterlockedDecrement
SetEnvironmentVariableA
SetEvent
FreeEnvironmentStringsW
WideCharToMultiByte
GetStringTypeA
TlsGetValue
MultiByteToWideChar
CompareStringW
GetCommandLineA
GetSystemTime
TerminateProcess
GetStartupInfoW
InterlockedExchange
OpenEventW
LCMapStringW
GetModuleHandleA
GetSystemTimeAsFileTime
InitializeCriticalSection
DeleteCriticalSection
OpenMutexW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetCurrentProcess
EnterCriticalSection
GetTimeZoneInformation
HeapDestroy
IsBadWritePtr
InterlockedIncrement
TlsFree
SetLastError
HeapCreate
GetCurrentProcessId
UnhandledExceptionFilter
CloseHandle
CompareStringA
GetProfileSectionW
GetVersion
GetLastError
ReadFile
GetStringTypeW
LeaveCriticalSection
VirtualQuery
SetStdHandle
TlsSetValue
CreateMutexA
GetModuleFileNameA
LoadLibraryA
GetDriveTypeA
HeapReAlloc
LCMapStringA
SetFilePointer
HeapAlloc
lstrcpy
GetCurrentThreadId
user32
OpenInputDesktop
DdeImpersonateClient
EnumDisplayDevicesA
SystemParametersInfoA
GetSystemMetrics
TabbedTextOutW
EnumWindowStationsA
DdeUninitialize
DdeQueryConvInfo
LoadMenuIndirectW
PostMessageA
ScrollWindowEx
RegisterClassExA
ScrollDC
RegisterClassA
CharToOemBuffA
GetPropW
GetWindow
RealGetWindowClass
TranslateMessage
SetShellWindow
DdeAddData
InsertMenuItemA
MsgWaitForMultipleObjects
GetActiveWindow
comctl32
ImageList_GetFlags
DrawStatusTextA
ImageList_LoadImage
ImageList_Copy
InitCommonControlsEx
DestroyPropertySheetPage
ImageList_LoadImageW
ImageList_Duplicate
Sections
.text Size: 152KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ