Static task
static1
Behavioral task
behavioral1
Sample
f513fa28d0c6334185437ace48fc25b7_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
f513fa28d0c6334185437ace48fc25b7_JaffaCakes118
-
Size
934KB
-
MD5
f513fa28d0c6334185437ace48fc25b7
-
SHA1
5c9db2821718ce564ae7d9c4602cd2c47dd17a17
-
SHA256
41f958617a4821fc80239f03b66b4d570facb6158188d252c3d7e59af65b5259
-
SHA512
2a7d6e1f6220614ca4fa5ae8b6c9d17ae2d056d2bf536ca933bc1e0ccb85e9b25c32dece93be056bf42028de0c57a9bed6755ae691cf1b6b8f14d6d53358cdb3
-
SSDEEP
24576:jFLQjSf9r23jcboRu/SYqG1rF5iRovJjPFI06vKpA:BLQj4r1mu6c/5imjFITypA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f513fa28d0c6334185437ace48fc25b7_JaffaCakes118
Files
-
f513fa28d0c6334185437ace48fc25b7_JaffaCakes118.exe windows:4 windows x86 arch:x86
08eaea125c79ac351107ffd263d3083e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
rpcrt4
RpcStringFreeW
user32
CreatePopupMenu
InsertMenuItemW
GetSubMenu
SetMenuDefaultItem
GetMenuItemInfoW
RemoveMenu
MessageBoxW
SetWindowTextW
LoadMenuW
RegisterClipboardFormatW
DeleteMenu
GetMenuItemCount
SendMessageW
LoadCursorW
InsertMenuW
SetCursor
CharNextW
LoadStringW
DestroyMenu
ole32
CoUninitialize
CoCreateInstance
CoInitializeEx
OleSetClipboard
ReleaseStgMedium
CoTaskMemFree
ntdll
NtAllocateVirtualMemory
RtlAdjustPrivilege
RtlAddAce
advapi32
BuildTrusteeWithNameA
CancelOverlappedAccess
CredRenameW
ConvertSidToStringSidA
CreateServiceW
ControlTraceA
kernel32
FreeLibrary
SetUnhandledExceptionFilter
GetSystemDirectoryW
DosDateTimeToFileTime
lstrcpynA
GetTempFileNameW
GlobalAlloc
GetVersionExW
GetShortPathNameW
lstrlenA
GetProcAddress
lstrlenW
GlobalHandle
lstrcmpiW
GetSystemTimeAsFileTime
_lread
CreateFileW
GetStartupInfoA
GlobalFree
GetModuleHandleW
TerminateProcess
GetCurrentThread
GetCurrentProcess
GetCurrentThreadId
LoadLibraryW
GetCurrentProcessId
GetTempPathW
_lwrite
GlobalUnlock
LocalAlloc
GetModuleFileNameW
LocalFileTimeToFileTime
_lclose
_llseek
GetTickCount
SetThreadPriority
LocalFree
lstrcmpW
GlobalLock
InterlockedIncrement
UnhandledExceptionFilter
lstrcpynW
GetWindowsDirectoryW
InterlockedDecrement
shell32
SHBrowseForFolderW
SHGetFileInfoW
ShellExecuteW
SHGetDesktopFolder
SHGetPathFromIDListW
SHGetPathFromIDListA
SHBindToParent
shlwapi
StrCpyNW
StrCmpNW
PathFindFileNameW
PathAddBackslashA
StrFormatKBSizeW
SHStrDupW
PathFindFileNameA
PathCombineW
StrRetToBufW
wnsprintfW
PathAppendW
msvcrt
memmove
_except_handler3
free
_adjust_fdiv
malloc
_initterm
Sections
.text Size: 222KB - Virtual size: 222KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 226KB - Virtual size: 226KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 474KB - Virtual size: 473KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 12.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE