Static task
static1
Behavioral task
behavioral1
Sample
01dd30d97b3f4c03eac16aa68a3a85da_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
01dd30d97b3f4c03eac16aa68a3a85da_JaffaCakes118
-
Size
92KB
-
MD5
01dd30d97b3f4c03eac16aa68a3a85da
-
SHA1
77248300403e22bd51477b179bcbbbbe3119f2b4
-
SHA256
efacc5809ad30877337361ed5d7f89c51800554e93a103fb18bc29d5504422f6
-
SHA512
c10831813a871a641bf9afe3727c3e9de53aec2339d522bf48fac4e34f4bef125cb4ff79e448cd25709ac78f6eae3151988d0043bfcd93b15e7c88e3ace847eb
-
SSDEEP
1536:k5Ct5Z30GflOvfkcUDxvESMp+NLfSEZQK2R1pgUpg10G6Y:kEt5eUIvGv7K0hrO1SUpguE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01dd30d97b3f4c03eac16aa68a3a85da_JaffaCakes118
Files
-
01dd30d97b3f4c03eac16aa68a3a85da_JaffaCakes118.exe windows:4 windows x86 arch:x86
2e0cbaa2c138e8cb6093f191e56c0058
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexA
lstrlenW
TlsGetValue
HeapCreate
GlobalUnlock
LoadLibraryExW
DeleteAtom
SetLastError
GetPriorityClass
GlobalFree
CloseHandle
SetEnvironmentVariableA
GetStdHandle
VirtualQuery
CreateFileA
GetModuleHandleA
FindResourceA
GetCurrentThreadId
ReleaseMutex
GetExitCodeProcess
user32
CheckRadioButton
FillRect
GetDlgItem
GetDC
SetFocus
CallWindowProcA
DrawMenuBar
DrawEdge
IsWindow
CreateWindowExA
DispatchMessageA
CreateMenu
GetIconInfo
ntshrui
IsPathSharedW
GetLocalPathFromNetResourceA
IsPathSharedA
GetNetResourceFromLocalPathA
SetFolderPermissionsForSharing
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 50KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE