Resubmissions
13-01-2025 04:29
250113-e39casyldr 10Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_20f133b0b3407b5d0c441aaf448a5f87.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_20f133b0b3407b5d0c441aaf448a5f87
-
Size
274KB
-
MD5
20f133b0b3407b5d0c441aaf448a5f87
-
SHA1
46d646d569357f08f730d254b0f2a2ad4adf19d9
-
SHA256
1a290a15b5d12f5e023f6c9575ac5d94342e13baa84fe93a202e172b96a2455b
-
SHA512
77e50a9e51fb5303ceff573a1b64588500b170eff81cceb52a18d67682d4ce01b9f5f0f5976535bcc92c4539c259fd182347da5f5d6a0075dedbd3fce5955b6c
-
SSDEEP
6144:/hsLoKMqEzfhk8El5WzhdkGlPPCYj3L8yKt:psLiqkhk8EDWkiSYTQBt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_20f133b0b3407b5d0c441aaf448a5f87
Files
-
JaffaCakes118_20f133b0b3407b5d0c441aaf448a5f87.exe windows:4 windows x86 arch:x86
5808677fae220064887ae08f3ae58db6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
GetModuleFileNameW
GlobalGetAtomNameA
GetPrivateProfileStringW
LoadLibraryW
InitializeCriticalSection
DeleteCriticalSection
GetProcAddress
LoadLibraryA
FindFirstFileW
GlobalSize
LoadResource
GetVersionExW
EnumResourceTypesA
FindClose
GetPrivateProfileIntW
lstrlenW
LockResource
FreeLibrary
GetDllDirectoryW
GetModuleHandleW
MultiByteToWideChar
Sleep
GetTickCount
WritePrivateProfileStringW
MulDiv
GetLocaleInfoW
shell32
DllGetVersion
SHGetPathFromIDListA
CommandLineToArgvW
ShellExecuteExW
ShellExecuteW
ShellExecuteExA
SHGetFolderPathW
SHFileOperationW
SHGetFileInfoA
SHBrowseForFolderA
Shell_NotifyIconA
ole32
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
Sections
.text Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ