f:\llq
Static task
static1
Behavioral task
behavioral1
Sample
435b84886751d19d0f71fb49b82ed32b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
435b84886751d19d0f71fb49b82ed32b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
435b84886751d19d0f71fb49b82ed32b_JaffaCakes118
-
Size
492KB
-
MD5
435b84886751d19d0f71fb49b82ed32b
-
SHA1
22c5454541c7c21e50820f87b16b12982db52fa8
-
SHA256
3263048668e464e26ccfcb505600c5f218feab5fefed201fca7a4d85adcbef8e
-
SHA512
95e3062fdc63686ba9a5cbcd86d82c2b313904e3aca2aeba4ee516789046fcd4ef8644fc4780a2e17436d2451b0489a2d96c74673b5926ee11ba87a42a1facbf
-
SSDEEP
12288:a5y5KfH41oRAwvpJGSMEFR700UOnCuTfKeMj10uJX:aw5KbBMDEFR700/TTfKeM50ux
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 435b84886751d19d0f71fb49b82ed32b_JaffaCakes118
Files
-
435b84886751d19d0f71fb49b82ed32b_JaffaCakes118.exe windows:4 windows x86 arch:x86
012e77b823eeaa1c6caefaaa3f68de9b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
ImageList_Copy
ImageList_GetImageRect
kernel32
DeleteCriticalSection
GetModuleFileNameA
VirtualAllocEx
IsValidLocale
HeapSize
GetCurrentThread
GetTimeZoneInformation
CompareStringA
IsValidCodePage
TlsGetValue
GetCPInfo
CloseHandle
FlushViewOfFile
HeapAlloc
HeapFree
GetTimeFormatA
GetTickCount
SetFilePointer
SetEnvironmentVariableW
TlsSetValue
HeapDestroy
GetCurrentProcess
GetProcAddress
GetVersionExA
GetDateFormatA
IsBadWritePtr
FlushFileBuffers
CompareStringW
WriteConsoleW
RtlUnwind
OpenMutexA
GetStringTypeW
QueryPerformanceCounter
GetLocaleInfoA
GetCommandLineA
HeapReAlloc
InterlockedExchange
VirtualFree
SetStdHandle
Sleep
ReadFile
GetStringTypeA
UnhandledExceptionFilter
GetOEMCP
GetFileType
GetLastError
lstrcpyA
CreateMutexA
GetSystemTimeAsFileTime
SetEnvironmentVariableA
LoadLibraryA
GetLocaleInfoW
EnumSystemLocalesA
LCMapStringW
WritePrivateProfileStructA
TerminateProcess
WriteProfileStringW
VirtualAlloc
GetModuleHandleA
WriteFile
WideCharToMultiByte
GetStartupInfoA
SetHandleCount
InitializeCriticalSection
GetEnvironmentStringsW
GetCurrentThreadId
GetUserDefaultLCID
SuspendThread
TlsFree
TlsAlloc
GetSystemInfo
VirtualQuery
MultiByteToWideChar
GetStdHandle
GetProfileStringA
SetConsoleCtrlHandler
LeaveCriticalSection
GetACP
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetCurrentProcessId
GetEnvironmentStrings
SetLastError
LCMapStringA
ExitProcess
VirtualProtect
EnterCriticalSection
HeapCreate
user32
SetKeyboardState
GetDlgItemTextA
GetUpdateRgn
GetClipboardFormatNameA
DrawFocusRect
DialogBoxParamA
DdeNameService
EnumDisplaySettingsExW
GetCaretBlinkTime
GetMenuItemInfoA
LoadBitmapA
CharToOemBuffA
GetWindowLongA
SetWinEventHook
RegisterClassA
GetGuiResources
IsDialogMessage
MessageBoxIndirectW
SetCapture
DrawTextExA
GetThreadDesktop
FlashWindow
ModifyMenuA
DestroyIcon
GetForegroundWindow
SetMenuItemInfoW
GetMonitorInfoW
SendIMEMessageExW
RegisterDeviceNotificationA
MapWindowPoints
ToAscii
SubtractRect
RegisterClassExA
GetDlgItem
EndTask
MessageBoxIndirectA
GetPropA
CharLowerBuffW
RemoveMenu
SetClassLongW
advapi32
RegQueryValueA
CryptDestroyKey
LookupPrivilegeDisplayNameA
RegQueryValueW
CryptSetProvParam
StartServiceW
RegLoadKeyA
GetUserNameA
comdlg32
GetSaveFileNameW
PageSetupDlgW
ChooseColorW
ReplaceTextA
wininet
InternetGetCookieA
FtpCommandA
InternetWriteFile
Sections
.text Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ