f:\sambod
Static task
static1
Behavioral task
behavioral1
Sample
5d5f6c239cdc96d5bd926195389ce78e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5d5f6c239cdc96d5bd926195389ce78e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5d5f6c239cdc96d5bd926195389ce78e_JaffaCakes118
-
Size
360KB
-
MD5
5d5f6c239cdc96d5bd926195389ce78e
-
SHA1
2c3b73ed6812cf8effcac8303d73baa7580e1f32
-
SHA256
83801fdcba58746be1df6a5b7241c5f0c1359a9b43108c6ef7227c2c35358962
-
SHA512
1f4d2bb4b63440837f2cd5cf70abdfae02d24b639171767543be2f6931da258adf0df5103a351e7f516c41b9be929f5a1d662129750d5696c146a9713434d43f
-
SSDEEP
6144:g5h6afbSBKAdhOPgy/VFdrAb02QRMTIgnvz/3QFZDC06Bib:S/fwKwhCgSVFVAb02QRM3z/3qZ54ib
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5d5f6c239cdc96d5bd926195389ce78e_JaffaCakes118
Files
-
5d5f6c239cdc96d5bd926195389ce78e_JaffaCakes118.exe windows:4 windows x86 arch:x86
98f5efbe5aa95dfca68518ec0b52f881
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetStdHandle
TlsSetValue
WideCharToMultiByte
RtlUnwind
GetOEMCP
LoadLibraryA
LeaveCriticalSection
GetThreadContext
FlushFileBuffers
TlsFree
HeapCreate
GetDriveTypeA
GetShortPathNameA
GetStartupInfoA
GetCurrentThread
GetCurrentProcess
GetUserDefaultLangID
GlobalSize
GetDiskFreeSpaceExA
GetLastError
GetCurrentDirectoryW
GlobalAlloc
MultiByteToWideChar
GetEnvironmentStrings
GetStringTypeW
GetCommandLineA
GetVersion
TerminateProcess
HeapLock
MapViewOfFileEx
ReadFile
VirtualAlloc
EnumResourceNamesA
HeapDestroy
PulseEvent
lstrlenW
GetEnvironmentStringsW
GetFullPathNameW
ExitProcess
SetLastError
CompareStringA
GetLocalTime
TlsGetValue
EnterCriticalSection
GetTickCount
FillConsoleOutputCharacterW
GetThreadPriority
SetEnvironmentVariableA
GetACP
GetCurrentThreadId
GetSystemTime
LCMapStringA
InitializeCriticalSection
RtlMoveMemory
HeapAlloc
GetCPInfo
GetProcAddress
DeleteCriticalSection
FlushViewOfFile
InterlockedDecrement
VirtualQuery
SetStdHandle
GetTimeZoneInformation
CreateFileMappingW
GetConsoleMode
IsBadWritePtr
GetStringTypeA
GetFileType
InterlockedIncrement
InterlockedExchange
TlsAlloc
GetModuleHandleA
SetHandleCount
CompareStringW
WriteFile
WaitCommEvent
OpenMutexA
GlobalFree
QueryPerformanceCounter
HeapReAlloc
GetModuleFileNameA
FreeEnvironmentStringsW
HeapFree
VirtualFree
GetProcessHeap
CloseHandle
LCMapStringW
lstrcmp
GetCurrentProcessId
UnhandledExceptionFilter
SetFilePointer
CreateMutexA
FreeEnvironmentStringsA
GetSystemTimeAsFileTime
lstrcpyA
comctl32
ImageList_EndDrag
ImageList_SetIconSize
DrawInsert
ImageList_Merge
ImageList_Destroy
InitCommonControlsEx
user32
GetMenuStringW
OpenIcon
DdeQueryNextServer
GetInputDesktop
GetProcessWindowStation
SetWinEventHook
UnhookWindowsHook
DestroyWindow
LookupIconIdFromDirectoryEx
DdeGetData
MessageBeep
CharToOemA
CallNextHookEx
GetMessageA
wvsprintfW
LookupIconIdFromDirectory
DefWindowProcA
IsWindowVisible
SetMessageExtraInfo
ScrollWindowEx
ShowWindow
SendIMEMessageExA
GetWindowWord
RegisterClassExA
SetWindowsHookExA
GetParent
GetScrollInfo
DestroyIcon
DdeGetLastError
DrawTextW
GetMenuContextHelpId
SystemParametersInfoW
CloseClipboard
DdeQueryConvInfo
GetKeyboardType
GetSubMenu
ImpersonateDdeClientWindow
IsWindowEnabled
SetDebugErrorLevel
RegisterClassA
DrawIconEx
EnumDesktopsA
InsertMenuA
MessageBoxA
CreateWindowExW
RegisterClassW
OemToCharW
DlgDirListA
DdeConnect
EndDialog
SendDlgItemMessageW
CheckDlgButton
Sections
.text Size: 112KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ