Static task
static1
Behavioral task
behavioral1
Sample
6442d000d43da2a6ec828641295e96b3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6442d000d43da2a6ec828641295e96b3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6442d000d43da2a6ec828641295e96b3_JaffaCakes118
-
Size
35KB
-
MD5
6442d000d43da2a6ec828641295e96b3
-
SHA1
8ab13b880cc1f9b8f06931171fc27c721dcfcec8
-
SHA256
2e580803ea1ab9814973551f882afa874a52c87e068040741f8ebf40034464bc
-
SHA512
53cdac0a056b3b322f2df40c91f23aceaccd8388231d1d32cb4c4777989b452e225f800ab95bd0d7f0a981381a035c75d530c4a7d48d7e7be804f35083a30c5c
-
SSDEEP
768:G4fH2yr4aDzi+qAoGmgm4lrJBenDWeiCNLHZImXb+GYJhn7:Gkb/D++qAWq9q9PNL54Jhn7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6442d000d43da2a6ec828641295e96b3_JaffaCakes118
Files
-
6442d000d43da2a6ec828641295e96b3_JaffaCakes118.exe windows:4 windows x86 arch:x86
861324359589909e5f2839cf00e558c2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHDeleteKeyA
StrStrIA
kernel32
GetModuleFileNameA
GetPrivateProfileIntA
GetPrivateProfileStringA
lstrcatA
DeleteFileA
RemoveDirectoryA
GetTempPathA
LoadLibraryA
ReadFile
WriteFile
lstrcmpiA
FreeLibrary
GetFileSize
lstrcmpA
WritePrivateProfileStringA
LoadLibraryExA
SetFileAttributesA
MultiByteToWideChar
GetSystemDirectoryA
MoveFileA
CopyFileA
SetFilePointer
FindFirstFileA
FindClose
CreateProcessA
WaitForSingleObject
GetPrivateProfileSectionNamesA
GetCurrentProcess
LocalFree
GetVersionExA
GlobalAlloc
GlobalFree
GetWindowsDirectoryA
HeapAlloc
GetProcessHeap
ExitProcess
GetDateFormatA
GetTimeFormatA
GetCommandLineA
GetDiskFreeSpaceA
GetProcAddress
GetModuleHandleA
lstrcpynA
CreateDirectoryA
lstrlenA
lstrcpyA
CloseHandle
CreateFileA
GetFileAttributesA
HeapFree
user32
IsCharUpperA
LoadStringA
FindWindowA
SendMessageA
wvsprintfA
IsCharAlphaA
IsCharAlphaNumericA
WaitForInputIdle
DispatchMessageA
TranslateMessage
PeekMessageA
CreateWindowExA
RegisterClassA
LoadCursorA
LoadIconA
DefWindowProcA
PostQuitMessage
GetDesktopWindow
CharLowerA
wsprintfA
gdi32
GetStockObject
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegFlushKey
RegQueryValueExA
RegEnumValueA
OpenProcessToken
DuplicateTokenEx
AllocateAndInitializeSid
GetLengthSid
RegCreateKeyExA
RegDeleteValueA
shell32
ShellExecuteA
ole32
CoCreateInstance
OleUninitialize
OleInitialize
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 69KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE