Static task
static1
Behavioral task
behavioral1
Sample
34ca5c34a565fd8f79565e1613685dec_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
34ca5c34a565fd8f79565e1613685dec_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
34ca5c34a565fd8f79565e1613685dec_JaffaCakes118
-
Size
66KB
-
MD5
34ca5c34a565fd8f79565e1613685dec
-
SHA1
d48508e1d3138da3ab369d106f08c1ac7902cd7d
-
SHA256
642826dd04d1424e7658e79f3dea20df4c88a90e8f0a566a1133e2bf3fdfaa64
-
SHA512
dd9bb5cd4c6d3d7e98ca09afb788e3ce947f230b6fa641d60e9a152d79c07d22b2bc2ff2b8e71cf7df19c51beac81c1792143b2a28b9809e33b2156d209f6102
-
SSDEEP
768:E0oIfVi8N9WZwJhs/mJ6+jDKClyoFDwIkkdM6As3jLFRTUqYtKqA7aq4dVcHq6A:E0o0NN5JhseJ6qDs2DwHLYLYkgv+pA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 34ca5c34a565fd8f79565e1613685dec_JaffaCakes118
Files
-
34ca5c34a565fd8f79565e1613685dec_JaffaCakes118.exe windows:5 windows x86 arch:x86
0f97adec96b3604a91fd0898fed24dbd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
oleaut32
SysFreeString
user32
MessageBoxA
kernel32
Sleep
VirtualFree
VirtualAlloc
VirtualQuery
GetSystemInfo
GetVersion
CompareStringW
SetThreadLocale
WideCharToMultiByte
MultiByteToWideChar
GetACP
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCommandLineW
FreeLibrary
UnhandledExceptionFilter
RtlUnwind
RaiseException
ExitProcess
GetCurrentThreadId
DeleteCriticalSection
InitializeCriticalSection
SetCurrentDirectoryW
GetCurrentDirectoryW
WriteFile
GetStdHandle
CloseHandle
GetProcAddress
RaiseException
LoadLibraryA
GetLastError
TlsSetValue
TlsGetValue
LocalFree
LocalAlloc
GetModuleHandleW
FreeLibrary
WriteFile
VirtualProtect
VirtualFree
VirtualAlloc
Sleep
SizeofResource
SetFilePointer
ReadFile
OutputDebugStringW
LockResource
LoadResource
LoadLibraryW
IsBadReadPtr
HeapFree
HeapAlloc
GetWindowsDirectoryW
GetVersionExW
GetProcessHeap
GetProcAddress
GetLocalTime
GetLastError
GetComputerNameW
FreeLibrary
FindResourceW
ExitProcess
CreateThread
CreateMutexW
CreateFileW
CopyFileW
CloseHandle
advapi32
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
RegDeleteValueW
RegCreateKeyW
RegCloseKey
wininet
InternetReadFile
InternetQueryDataAvailable
InternetOpenUrlW
InternetOpenW
InternetConnectW
InternetCloseHandle
HttpSendRequestA
HttpOpenRequestW
shfolder
SHGetFolderPathW
shell32
ShellExecuteW
ole32
CoTaskMemFree
StringFromCLSID
CoCreateGuid
Sections
.text Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 512B - Virtual size: 292B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 10KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ