Static task
static1
Behavioral task
behavioral1
Sample
f0018fcc9cf88d831de7622791bec85d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f0018fcc9cf88d831de7622791bec85d_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f0018fcc9cf88d831de7622791bec85d_JaffaCakes118
-
Size
20KB
-
MD5
f0018fcc9cf88d831de7622791bec85d
-
SHA1
438764ff4a1e9bb6d3432e459e5690ce2460d22e
-
SHA256
e6c61df0537d67db0e7f8ec6f3b88c3fe7930b01fb694eeda1082990458a8c2e
-
SHA512
002ec764c755872e3f5007a5ecffbcd2bb86f339cd2b07e01d4d04071351cf6d9eab9bd24de000c3dc5bc56a9a2c3d750ebecc1ffdf6b37af3b2db16bdd28a57
-
SSDEEP
192:+/HDikfEKlH3YkZg33Y0KuVM3MS+qpx5yFpq0g5tCDD:8lokZM3YCVQMRqfI7qf543
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f0018fcc9cf88d831de7622791bec85d_JaffaCakes118
Files
-
f0018fcc9cf88d831de7622791bec85d_JaffaCakes118.exe windows:4 windows x86 arch:x86
6f42fcf598ba8bee87c0f232833b9f2f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegOpenKeyA
RegSetValueExA
kernel32
AddAtomA
CopyFileA
ExitProcess
FindAtomA
GetAtomNameA
GetCommandLineA
GetCurrentDirectoryA
GetModuleHandleA
GetStartupInfoA
SetUnhandledExceptionFilter
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
fclose
fflush
fopen
fprintf
free
getenv
malloc
signal
sprintf
strcpy
strlen
system
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 816B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 720B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE