D:\Information\Desktop\Windows\OS_Starter.exe
Static task
static1
Behavioral task
behavioral1
Sample
15fd552387e15347d08bfd5963987a83_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
15fd552387e15347d08bfd5963987a83_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
15fd552387e15347d08bfd5963987a83_JaffaCakes118
-
Size
192KB
-
MD5
15fd552387e15347d08bfd5963987a83
-
SHA1
ca7a428090763898161ba4e8910760e1164dc37c
-
SHA256
8941d406dee5fa2e1388593d24e2c268155aaab589b75acf516db1b3ca1baccc
-
SHA512
1d8316f8ca295de25fbee7719ecb353e5a527fdcc70b0c4231e7614ac64e94f785a920ede51ed60161fdbb76b4b3541e79e3b57ab88d08527cd9e18fb3a275fc
-
SSDEEP
3072:EAfgyvJsEXEhZjazfVgaSWgayRglLrbTM3jm7+q8sg5kKEpzejANErEE3NihHwq0:Nfgyv9XEhZ0QWgIf/MK8sgRvrF3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 15fd552387e15347d08bfd5963987a83_JaffaCakes118
Files
-
15fd552387e15347d08bfd5963987a83_JaffaCakes118.dll windows:5 windows x86 arch:x86
f01930adbebe24c0a91f4fef39fa9292
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
wcscmp
_cexit
_exit
__p__fmode
__setusermatherr
gets
_XcptFilter
__p__commode
isupper
__set_app_type
_controlfp
_initterm
_ismbblead
towupper
clearerr
fputs
exit
_amsg_exit
__getmainargs
kernel32
EnumResourceTypesA
FindResourceW
LocalUnlock
WaitForMultipleObjectsEx
LoadResource
DeleteFileA
SearchPathW
MoveFileA
SetFileAttributesA
IsValidLocale
LoadLibraryA
CreateMailslotW
GetUserDefaultUILanguage
Exports
Exports
_ReplyMessageReplyMessageReplyMessage@0
Sections
.text Size: 158KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ