?SectionOutput@@YGGPAG@Z
Static task
static1
Behavioral task
behavioral1
Sample
854df3e09aa85371f7745f5dd4a15bf0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
854df3e09aa85371f7745f5dd4a15bf0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
854df3e09aa85371f7745f5dd4a15bf0_JaffaCakes118
-
Size
166KB
-
MD5
854df3e09aa85371f7745f5dd4a15bf0
-
SHA1
6eda7b75a2f3a0c19425e071cbce86fa2a2e1fcd
-
SHA256
7a9d0b89501fe2b66a64d0d5c45e6c813f2dd39a6551bf6ba2d711611e8ba7b5
-
SHA512
704c144760fcd07c750df112581ab2d7842c6937d8f00b3b2347ea0cfaa02cda133ee5d7be6916ce90fa324b35a9fa0b26a352700ac944879df055f3383862d1
-
SSDEEP
3072:/RNyB2apJZdQdTiQQc5HRHcjcsIvSnTDslHQH8ACTGj9dglGP2OujBbvd:p41ZoTLQumwqD0wHOTGjCVj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 854df3e09aa85371f7745f5dd4a15bf0_JaffaCakes118
Files
-
854df3e09aa85371f7745f5dd4a15bf0_JaffaCakes118.exe windows:5 windows x86 arch:x86
343babf7450ae8b99bc8f4e23051834d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathIsLFNFileSpecW
StrChrNW
PathIsSameRootA
PathIsNetworkPathA
StrRChrA
PathMakePrettyW
PathIsFileSpecA
kernel32
FindNextVolumeMountPointW
SuspendThread
FindFirstVolumeW
FileTimeToLocalFileTime
GetWindowsDirectoryW
GetDiskFreeSpaceExW
OpenEventW
GetCurrentDirectoryA
SetFilePointer
lstrcpynA
SetErrorMode
FreeLibrary
CreateProcessW
SetWaitableTimer
GlobalAddAtomA
GetCompressedFileSizeW
LoadLibraryW
GetConsoleMode
GetLocaleInfoW
Sleep
GetVersionExW
lstrcpynW
GetFileAttributesW
WriteConsoleW
GetBinaryTypeA
lstrlenW
EnumResourceNamesA
GetPrivateProfileIntW
GetProfileIntA
SetCurrentDirectoryA
GetStartupInfoA
GetProcAddress
ResetEvent
LoadLibraryA
LocalAlloc
CreateFileMappingW
SetCurrentDirectoryW
GetSystemInfo
GetModuleFileNameA
user32
VkKeyScanW
GetActiveWindow
Exports
Exports
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 512B - Virtual size: 204B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 13B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 145KB - Virtual size: 217KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 808B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ