k:\ooeoc
Static task
static1
Behavioral task
behavioral1
Sample
06edf412dff7ed7a87f19ed156ae8323_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06edf412dff7ed7a87f19ed156ae8323_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
06edf412dff7ed7a87f19ed156ae8323_JaffaCakes118
-
Size
387KB
-
MD5
06edf412dff7ed7a87f19ed156ae8323
-
SHA1
40b5ea7e25068d19e4d488cfd53523126dbea3a2
-
SHA256
cfc79a291cc2839837cdb15e298e08392ee40fec80819f122224d6e0968ba6f3
-
SHA512
1c90123158e07df6881db95e8484e95f1a00eec8ae8b4ceb49cb7798388035cccd36f12a40f06ffba36bc7f586dbb74020d77a077659c2d2b02c6dd53271dfb4
-
SSDEEP
12288:+PW7LAfQEx1HUB2Bzv3RBnUkV39OyRJxNsL6BkMzkOJd:+PGLAoEb22N3RSkR9OyzE8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 06edf412dff7ed7a87f19ed156ae8323_JaffaCakes118
Files
-
06edf412dff7ed7a87f19ed156ae8323_JaffaCakes118.exe windows:4 windows x86 arch:x86
26984dabede06143e0bce4947b4b5d44
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_DragEnter
DrawStatusText
CreateToolbar
InitCommonControlsEx
kernel32
DeleteCriticalSection
GetDateFormatA
GetCPInfo
MultiByteToWideChar
GetCurrentProcessId
GetStartupInfoW
InterlockedDecrement
lstrlen
HeapCreate
GetModuleHandleA
GetACP
GetProcessHeap
GetLocaleInfoW
GetCommandLineW
GetEnvironmentStringsW
LCMapStringA
VirtualAllocEx
GetCurrentProcess
TlsFree
CreateFileA
ExitProcess
SetFilePointer
SetHandleCount
GetProcAddress
FreeEnvironmentStringsA
FreeLibrary
QueryPerformanceCounter
ResumeThread
GetCurrentThread
GetModuleFileNameA
HeapFree
FreeEnvironmentStringsW
GetStartupInfoA
InterlockedIncrement
GetStringTypeW
TerminateProcess
FlushFileBuffers
GetLastError
VirtualQuery
GetStdHandle
VirtualAlloc
SetEnvironmentVariableA
VirtualFree
TlsSetValue
GetUserDefaultLCID
IsValidLocale
GetVersionExA
TlsGetValue
ResetEvent
GetOEMCP
GetConsoleMode
HeapDestroy
GetFileType
SetUnhandledExceptionFilter
HeapReAlloc
EnumSystemLocalesA
SetConsoleCtrlHandler
WriteConsoleW
ReadFile
SetLastError
TlsAlloc
HeapSize
LeaveCriticalSection
WideCharToMultiByte
GetSystemTimeAsFileTime
GetTickCount
WriteFile
IsValidCodePage
InitializeCriticalSection
HeapAlloc
CompareStringA
CompareStringW
GetConsoleCP
WriteConsoleA
GetCurrentThreadId
InterlockedExchange
LoadLibraryA
GetConsoleOutputCP
GetEnvironmentStrings
GetTimeZoneInformation
RtlUnwind
GetModuleFileNameW
Sleep
CreateMutexA
GetThreadLocale
SetStdHandle
GetTimeFormatA
GetCommandLineA
CloseHandle
OpenMutexA
IsDebuggerPresent
GetStringTypeA
UnhandledExceptionFilter
GetLocaleInfoA
EnterCriticalSection
LCMapStringW
OpenWaitableTimerA
user32
CharPrevA
DrawStateW
GetCursorInfo
DestroyWindow
LoadCursorW
SystemParametersInfoW
RegisterClassA
GetClipboardSequenceNumber
VkKeyScanExA
RegisterClassExA
ExcludeUpdateRgn
DefFrameProcA
BroadcastSystemMessageA
GetMessageTime
DlgDirSelectComboBoxExA
IsCharUpperA
MapDialogRect
comdlg32
ChooseColorA
gdi32
DeleteDC
StartDocW
GetDeviceCaps
CreatePalette
PtInRegion
GetKerningPairs
CreateDCW
SetLayout
GdiPlayDCScript
GetAspectRatioFilterEx
CreateDCA
GetMetaFileW
wininet
HttpSendRequestA
InternetAlgIdToStringA
InternetInitializeAutoProxyDll
FindFirstUrlCacheEntryA
InternetCheckConnectionA
ShowCertificate
InternetSetOptionExW
FtpFindFirstFileW
GetUrlCacheEntryInfoA
Sections
.text Size: 257KB - Virtual size: 256KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ