Static task
static1
Behavioral task
behavioral1
Sample
34dcc82e0a61d56b807e9d80050ee40f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
34dcc82e0a61d56b807e9d80050ee40f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
34dcc82e0a61d56b807e9d80050ee40f_JaffaCakes118
-
Size
40KB
-
MD5
34dcc82e0a61d56b807e9d80050ee40f
-
SHA1
c1fbba3055b7d074e8f16c17ceae5f5079930aea
-
SHA256
d062e4900a284f1b771911ff4f6987c6b7d0939f08a503c53c49aa0ce6afa353
-
SHA512
a206744a90ffbc2775e04a13e32694209f65a4e00d2739a4815fcd6934ed89de3558e056f6f21318b599f42a4630cda9ff909f8fb79df6ac42cb43ba0a67679b
-
SSDEEP
768:mjd57hwRWHuZV+hg5UyKWb/Zf9Vv0o/eG/M8wa8xAWwmr7vnko8xt8u:87etZ6z6R1Vv5esMnXxRtn8o+x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 34dcc82e0a61d56b807e9d80050ee40f_JaffaCakes118
Files
-
34dcc82e0a61d56b807e9d80050ee40f_JaffaCakes118.exe windows:4 windows x86 arch:x86
217385aebdfc0fe9d023e47b0036b5c6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetInstanceExplorer
SHGetPathFromIDListW
SHGetDataFromIDListW
SHFileOperationA
user32
DdeConnectList
DdeQueryStringA
ClientToScreen
DrawIcon
DrawMenuBar
ClipCursor
AppendMenuW
GetClassNameA
GetClipboardData
DlgDirListA
AnyPopup
DdeDisconnect
DrawTextExA
GetClipCursor
msvcrt
_wexecvp
_CIsinh
_wspawnv
_chgsign
_lock
mbtowc
atoi
_initterm
_unlink
putwchar
_wstrdate
_strnset
_fpclass
modf
vwprintf
_HUGE
iscntrl
_adj_fdivr_m32
_ismbcdigit
_endthreadex
_ismbcpunct
_timezone
_jn
memchr
floor
fscanf
strncmp
clock
vprintf
tanh
_ltoa
__isascii
_get_sbh_threshold
fgetws
_assert
_fstati64
_CIcos
_strset
calloc
gdi32
Pie
GetViewportOrgEx
CreateBitmapIndirect
GetRandomRgn
RemoveFontResourceA
GetStretchBltMode
EnumFontsA
GetStockObject
CreateDiscardableBitmap
GetTextExtentPointA
GetClipRgn
GetPolyFillMode
GetObjectType
GetMiterLimit
PlayMetaFileRecord
GetTextFaceA
GetCurrentObject
GetGraphicsMode
AddFontResourceA
CreateDIBPatternBrush
TextOutW
GetSystemPaletteUse
kernel32
WriteProfileSectionA
RtlFillMemory
VirtualAlloc
DosDateTimeToFileTime
IsBadHugeWritePtr
GlobalGetAtomNameA
GetCommConfig
_lwrite
GetConsoleTitleA
GetCommProperties
SetConsoleScreenBufferSize
FindFirstChangeNotificationA
GetConsoleOutputCP
SetLastError
GetProfileIntW
Sleep
UnlockFile
GetProcessHeap
GetDiskFreeSpaceExW
CreateJobObjectA
GetStartupInfoA
FatalAppExitA
GetHandleInformation
_lread
_hwrite
GetVolumeInformationW
ExitProcess
GetTickCount
FindResourceW
GetVersion
VirtualAllocEx
GlobalCompact
UnmapViewOfFile
MoveFileW
GetProcessWorkingSetSize
GetConsoleCommandHistoryLengthA
GetModuleHandleA
GetThreadLocale
VirtualFree
GetNumberOfConsoleInputEvents
GetLongPathNameW
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hwuay Size: 7KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ohbs Size: 7KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 18KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE