Static task
static1
Behavioral task
behavioral1
Sample
39f7346d07af5c9d6a48e59aff6b41b4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
39f7346d07af5c9d6a48e59aff6b41b4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
39f7346d07af5c9d6a48e59aff6b41b4_JaffaCakes118
-
Size
74KB
-
MD5
39f7346d07af5c9d6a48e59aff6b41b4
-
SHA1
1590c7c707e13def9d3689bf3273f1b28ef1ded2
-
SHA256
9ce4a6a6124489eeb766734e3a7e81b46a4696dc1c107cb84d9aa14ab2ca9b63
-
SHA512
92c0b2bdd7159cb9465bdf73662301e826c1cb7ab8ee8a42f35b9d786eada4c76999a87c1d9a683bef906e49bd7dad467097d84427af3d466df4e021b8479ada
-
SSDEEP
1536:ohm9NJHQP6Kw3UWQnCKtU1RWB9WOO6Udby78Q1v:/VPZ3UWpKWRMe6Ud27Rv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39f7346d07af5c9d6a48e59aff6b41b4_JaffaCakes118
Files
-
39f7346d07af5c9d6a48e59aff6b41b4_JaffaCakes118.exe windows:4 windows x86 arch:x86
a5e271e034cb008d607c9730dced824a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
GetModuleFileNameA
GetShortPathNameA
GetVersionExA
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
GetTimeZoneInformation
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetSystemDirectoryA
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetProcAddress
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
GetOEMCP
GetACP
GetCPInfo
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
LocalAlloc
LocalFree
GetCurrentDirectoryA
SetCurrentDirectoryA
FreeLibrary
GetEnvironmentStrings
LoadLibraryA
GetExitCodeProcess
CreateProcessA
lstrcatA
lstrlenA
WinExec
CloseHandle
GetLastError
SetFilePointer
WriteFile
ReadFile
GetEnvironmentVariableA
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
CreateFileA
LCMapStringW
SetFileAttributesA
GetFileAttributesA
ExitProcess
TerminateProcess
GetCurrentProcess
HeapCompact
HeapAlloc
HeapReAlloc
HeapFree
RemoveDirectoryA
DeleteFileA
FindFirstFileA
FindNextFileA
SetEnvironmentVariableA
user32
SendMessageA
GetWindow
GetSystemMetrics
CreateWindowExA
LoadIconA
LoadCursorA
RegisterClassA
CreateDialogParamA
GetDlgItem
DestroyWindow
PostQuitMessage
DefWindowProcA
CharToOemA
DialogBoxParamA
EndDialog
SetDlgItemTextA
TranslateMessage
DispatchMessageA
GetMessageA
IsDialogMessageA
SetWindowLongA
SetWindowTextA
MessageBoxA
wsprintfA
PeekMessageA
gdi32
DeleteObject
RemoveFontResourceA
GetObjectA
CreateFontIndirectA
GetStockObject
advapi32
RegQueryValueExA
RegQueryValueA
RegEnumKeyExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
shell32
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
ole32
OleUninitialize
OleInitialize
comctl32
ord17
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ