Static task
static1
Behavioral task
behavioral1
Sample
5736d3f4df1db7a73fdd4c1c9eb93740_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
5736d3f4df1db7a73fdd4c1c9eb93740_JaffaCakes118
-
Size
83KB
-
MD5
5736d3f4df1db7a73fdd4c1c9eb93740
-
SHA1
55880167716fb74081169fb6f8bbbfea6a4312c9
-
SHA256
c569defa7cabd8ba297879c19953528d340e4d0bf765339c480045ac2af9068a
-
SHA512
8a6c1a4b4f6b2933be3b2c5d83a3ebd8bfe0eb163b0afaf2db944205623b71d0bf79041763ac50cdcc1b00ddc9ebb1e08aaaba669bb19bddb447fe1807abaa62
-
SSDEEP
768:OVZU6NjfqPmR5i43vNE0Br2MLob1V+sJqZFDKrD+akqr3JuLUXgIEs5zKdqlsecI:gfwK3vWESMLO+wqZMD+arNT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5736d3f4df1db7a73fdd4c1c9eb93740_JaffaCakes118
Files
-
5736d3f4df1db7a73fdd4c1c9eb93740_JaffaCakes118.exe windows:5 windows x86 arch:x86
ddcbba445126fa00757713b85a5d15df
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
GetModuleFileNameW
GetModuleHandleW
GetPrivateProfileSectionW
GetPrivateProfileStringW
GetProcAddress
GetStartupInfoW
GetSystemTimeAsFileTime
GetTempFileNameW
GetThreadLocale
GetTickCount
GetWindowsDirectoryW
GlobalAlloc
GlobalFree
GlobalLock
GlobalReAlloc
GlobalSize
GlobalUnlock
LoadLibraryExW
LoadLibraryW
LoadResource
LocalAlloc
GetEnvironmentVariableW
LockResource
MoveFileW
MulDiv
MultiByteToWideChar
QueryPerformanceCounter
RemoveDirectoryW
SearchPathW
SetErrorMode
SetFileAttributesW
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
WinExec
WriteFile
WritePrivateProfileStringW
lstrcmpW
lstrcmpiW
lstrcpynW
lstrlenA
lstrlenW
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetCommandLineW
FreeResource
FreeLibrary
FindResourceW
FindFirstFileW
FindClose
ExpandEnvironmentStringsW
ExitProcess
EnumResourceNamesW
DeleteFileW
CreateFileW
CloseHandle
GetDriveTypeW
GetStartupInfoA
VirtualAlloc
LocalFree
ReadFile
user32
PeekMessageW
MessageBoxW
LookupIconIdFromDirectory
LoadStringW
LoadCursorW
GetSystemMetrics
GetSystemMenu
GetLastActivePopup
ReleaseDC
GetDC
GetClientRect
EnableMenuItem
DispatchMessageW
DestroyWindow
CreateDialogParamW
CopyRect
CharNextW
LoadIconW
SendDlgItemMessageW
SystemParametersInfoW
SetForegroundWindow
SetDlgItemTextW
GetDlgItem
SetCursor
gdi32
GetTextExtentPointW
GetTextExtentExPointW
GetStockObject
GetDeviceCaps
advapi32
RegEnumKeyW
RegSetValueW
RegSetValueExW
RegQueryValueW
RegOpenKeyExA
RegCloseKey
RegCreateKeyW
RegDeleteKeyW
RegEnumKeyExW
RegEnumValueW
RegOpenKeyExW
RegOpenKeyW
RegQueryInfoKeyW
RegQueryValueExW
shell32
SHAddToRecentDocs
SHChangeNotify
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteExW
FindExecutableW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
msvcrt
_vsnwprintf
memmove
memcpy
Sections
.text Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 736B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ