Static task
static1
Behavioral task
behavioral1
Sample
b35a02da95216f23618d196f1d7237d6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b35a02da95216f23618d196f1d7237d6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b35a02da95216f23618d196f1d7237d6_JaffaCakes118
-
Size
27KB
-
MD5
b35a02da95216f23618d196f1d7237d6
-
SHA1
997b2b59dc6016dd8bcd498eb7011c9647d9eea6
-
SHA256
5e9029300130700be487fd993ace20a74c30196cb64dbbfc7813f39574b2cba9
-
SHA512
0c4e33b54b9ff457a291c0760d7095cd917c8653564d8a6f207d7a2bc2a37884e23c241ebf972bc11069bb09736a751b010481be01398abb27b5e02f52d130c7
-
SSDEEP
384:HlRephlDRInsYjFMbmpak3nnNwLm5nC5l9D/93BNnBq:HlRy3is/aLnNwL+gl9zZBq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b35a02da95216f23618d196f1d7237d6_JaffaCakes118
Files
-
b35a02da95216f23618d196f1d7237d6_JaffaCakes118.exe windows:4 windows x86 arch:x86
b13474c1e1f6bb3eeed461937d389df0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
NtAllocateVirtualMemory
RtlAddAce
RtlAdjustPrivilege
shell32
ShellExecuteW
SHBrowseForFolderW
SHGetPathFromIDListA
SHBindToParent
SHGetFileInfoW
SHGetPathFromIDListW
SHGetDesktopFolder
user32
LoadMenuW
RemoveMenu
SetMenuDefaultItem
RegisterClipboardFormatW
CharNextW
DestroyMenu
GetMenuItemInfoW
SetWindowTextW
CreatePopupMenu
LoadStringW
MessageBoxW
InsertMenuItemW
LoadCursorW
SetCursor
GetMenuItemCount
GetSubMenu
InsertMenuW
DeleteMenu
SendMessageW
rpcrt4
RpcStringFreeW
ole32
CoUninitialize
CoInitializeEx
ReleaseStgMedium
CoTaskMemFree
CoCreateInstance
OleSetClipboard
kernel32
GetTempPathW
GetStartupInfoA
SetThreadPriority
DosDateTimeToFileTime
GlobalLock
GetCurrentThread
GetModuleFileNameW
LocalFileTimeToFileTime
_lwrite
GetModuleHandleW
lstrlenA
_lclose
GlobalHandle
UnhandledExceptionFilter
GetTempFileNameW
lstrcmpW
GetCurrentProcess
GetSystemDirectoryW
lstrlenW
GlobalFree
LocalAlloc
lstrcpynW
TerminateProcess
_lread
GlobalAlloc
GetProcAddress
GetShortPathNameW
GetSystemTimeAsFileTime
_llseek
GlobalUnlock
SetUnhandledExceptionFilter
GetWindowsDirectoryW
GetVersionExW
lstrcpynA
QueryPerformanceCounter
FreeLibrary
LoadLibraryW
CreateFileW
GetTickCount
lstrcmpiW
InterlockedIncrement
GetCurrentProcessId
LocalFree
InterlockedDecrement
shlwapi
wnsprintfW
SHStrDupW
PathAddBackslashA
PathAppendW
StrCmpNW
PathFindFileNameA
PathFindFileNameW
StrCpyNW
PathCombineW
StrRetToBufW
StrFormatKBSizeW
advapi32
CreateServiceW
CredRenameW
ConvertSidToStringSidA
ControlTraceA
BuildTrusteeWithNameA
CancelOverlappedAccess
msvcrt
_adjust_fdiv
memmove
_except_handler3
free
_initterm
malloc
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ