Static task
static1
Behavioral task
behavioral1
Sample
34daa88a27ffb41657d4cf8334a8d55f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
34daa88a27ffb41657d4cf8334a8d55f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
34daa88a27ffb41657d4cf8334a8d55f_JaffaCakes118
-
Size
81KB
-
MD5
34daa88a27ffb41657d4cf8334a8d55f
-
SHA1
a192b420775a9d3f5bbc475b9259fcb93a0b373b
-
SHA256
5b016899a3a3be612977cdf17e654e6e67dbaccfe46711b00eaf1d817087daf1
-
SHA512
687d65fce9f8b669de4fba0b7a40e14e61d747fa21384a5604d0b8fd8623cb0547ab55cdcea43c9c3bbcc4bd6dc144008a7da53c506a30d053ddc522cea9c328
-
SSDEEP
1536:qOlNjowMqFRkdHiNIE9nTYk+xZ06PX+RecL3zIoLDQ:qOlN8wfFiexT50sLfQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 34daa88a27ffb41657d4cf8334a8d55f_JaffaCakes118
Files
-
34daa88a27ffb41657d4cf8334a8d55f_JaffaCakes118.exe windows:4 windows x86 arch:x86
84f448b20cbf176102ed93dd8f71c057
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SendDlgItemMessageA
CharNextA
SetWindowPos
ReleaseDC
MsgWaitForMultipleObjects
GetWindowRect
DispatchMessageA
GetWindowLongA
PeekMessageA
DialogBoxIndirectParamA
LoadStringA
ShowWindow
EnableWindow
GetDlgItem
wsprintfA
SetWindowTextA
MessageBoxA
CharUpperA
CallWindowProcA
SendMessageA
CharPrevA
GetDesktopWindow
ExitWindowsEx
EndDialog
GetDlgItemTextA
SetWindowLongA
SetDlgItemTextA
GetDC
MessageBeep
SetForegroundWindow
ntdll
RtlEqualUnicodeString
RtlCreateSecurityDescriptor
NtQueryObject
NtSetSecurityObject
RtlInitAnsiString
RtlInitUnicodeString
NtQuerySecurityObject
kernel32
GetFileAttributesW
GetSystemTime
GetWindowsDirectoryA
FindClose
ReleaseMutex
GetSystemTimeAsFileTime
SizeofResource
SetUnhandledExceptionFilter
CreateDirectoryW
WriteFile
InterlockedDecrement
SetLastError
GetUserDefaultLangID
GetLastError
InitializeCriticalSection
GetVersionExA
RemoveDirectoryW
DeleteFileW
IsBadReadPtr
DeviceIoControl
GetTempPathW
GetCurrentProcessId
GetSystemDirectoryW
MultiByteToWideChar
GetTempFileNameW
CreateMutexA
SetFilePointer
ReleaseSemaphore
FindFirstFileW
CloseHandle
GetFileSize
GetCurrentThreadId
QueryPerformanceCounter
LoadResource
GetPrivateProfileIntW
GetSystemDefaultLangID
HeapFree
FindResourceW
SetFileAttributesA
GetTickCount
FindNextFileW
VirtualUnlock
VirtualAlloc
VirtualFree
HeapAlloc
GetProcessHeap
CreateFileW
lstrlenA
CreateFileA
ReadFile
VirtualLock
GetPrivateProfileStringW
InterlockedIncrement
lstrcmpiA
UnhandledExceptionFilter
CreateSemaphoreA
LockResource
ConnectNamedPipe
LocalFree
GetStartupInfoA
GetCurrentProcess
SetEndOfFile
ole32
CLSIDFromProgID
CoDisconnectObject
CoCreateInstance
OleInitialize
advapi32
CryptGetHashParam
CryptHashData
RegCloseKey
RegQueryValueExA
CryptDestroyHash
RegOpenKeyExA
CryptAcquireContextA
CryptCreateHash
gdi32
CreateFontIndirectA
GetStockObject
DeleteObject
GetObjectA
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 60KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ