d:\stieya\sdufb\t
Static task
static1
Behavioral task
behavioral1
Sample
ef792c2df45957ea9833f2baad7c4823_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef792c2df45957ea9833f2baad7c4823_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef792c2df45957ea9833f2baad7c4823_JaffaCakes118
-
Size
317KB
-
MD5
ef792c2df45957ea9833f2baad7c4823
-
SHA1
62c30ca13d0f6baa0bd25e087238531b1c0bd878
-
SHA256
a39a75a11f81c6c7926b1194e363ccff24b686e7db93246834c32ee46e4684ae
-
SHA512
bb809e696ca41a5aa22f1648c72ca055a2e9fab1029be2080da3a1005c0ddaac94937d172dad0f581144760c9840d05d4ddd9622c35c3510a69b9a68a57e8d99
-
SSDEEP
6144:HOYKWpO6be0iLmXjydZSJfBiILKGOvvMpth5yPeCqPmb8zMlFxz4qf8WymE:HOYKMO6bevmXjUwBiILTOX4h5yPlqzzg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef792c2df45957ea9833f2baad7c4823_JaffaCakes118
Files
-
ef792c2df45957ea9833f2baad7c4823_JaffaCakes118.exe windows:4 windows x86 arch:x86
92242e8255f4ad3959fe498f945d63b1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
PageSetupDlgW
ChooseColorA
GetOpenFileNameA
PrintDlgW
user32
GetShellWindow
CreateWindowExA
RegisterClassA
TranslateMessage
BroadcastSystemMessageA
LoadAcceleratorsW
RegisterHotKey
DlgDirSelectComboBoxExW
ShowWindow
MoveWindow
CallWindowProcA
GetMenuStringW
MonitorFromRect
RegisterClassExA
ShowScrollBar
ClipCursor
GetClassInfoW
SetMenuContextHelpId
MessageBoxA
wininet
HttpAddRequestHeadersA
FindNextUrlCacheContainerA
InternetWriteFile
InternetHangUp
InternetCrackUrlW
FtpCommandA
kernel32
HeapCreate
FlushFileBuffers
GetCurrentThread
SetHandleCount
GetTimeFormatA
ReadFileEx
QueryPerformanceCounter
GetPrivateProfileIntW
TerminateProcess
SetEnvironmentVariableW
ReadFile
EnumSystemLocalesA
GetStringTypeW
GetStartupInfoA
WideCharToMultiByte
LocalReAlloc
GetCurrentProcessId
GetCurrentProcess
FreeEnvironmentStringsW
GetACP
TlsSetValue
GetLocaleInfoA
TlsGetValue
LCMapStringW
GetThreadPriority
VirtualProtect
TlsFree
GetModuleFileNameA
GetDateFormatA
GetEnvironmentStrings
HeapAlloc
GetEnvironmentStringsW
GetTimeZoneInformation
GetCalendarInfoW
GetCommandLineW
SetEnvironmentVariableA
HeapReAlloc
SetLocalTime
CreateWaitableTimerA
GlobalSize
PulseEvent
SetLastError
GetVersionExA
GetExitCodeProcess
SetFilePointer
IsBadWritePtr
MultiByteToWideChar
GetFileType
ExitProcess
UnhandledExceptionFilter
EnterCriticalSection
GetSystemInfo
GetSystemTimeAsFileTime
HeapFree
CreateMutexW
HeapDestroy
OpenMutexA
DeleteCriticalSection
FreeEnvironmentStringsA
GetProcAddress
VirtualAlloc
TlsAlloc
GetTickCount
CompareStringA
LoadLibraryA
CompareStringW
RtlUnwind
GetUserDefaultLCID
GetUserDefaultLangID
GetStringTypeA
WriteFile
CloseHandle
HeapSize
VirtualFree
GetLocaleInfoW
SetStdHandle
SetConsoleTextAttribute
GetLastError
GlobalAlloc
LocalAlloc
LeaveCriticalSection
GetCommandLineA
GetCurrentThreadId
RemoveDirectoryW
VirtualQuery
GetOEMCP
WaitForMultipleObjectsEx
CreateMutexA
GetModuleHandleA
SleepEx
IsValidCodePage
lstrcmpW
WaitNamedPipeA
IsValidLocale
LCMapStringA
InitializeCriticalSection
GetStdHandle
GetCPInfo
InterlockedExchange
advapi32
CryptSetKeyParam
RegEnumKeyA
RegQueryInfoKeyA
LookupAccountSidA
CryptSignHashA
RegEnumValueW
comctl32
InitCommonControlsEx
Sections
.text Size: 188KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ