Static task
static1
Behavioral task
behavioral1
Sample
f2ae795f8ebbadce22514448da43882b_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f2ae795f8ebbadce22514448da43882b_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f2ae795f8ebbadce22514448da43882b_JaffaCakes118
-
Size
20KB
-
MD5
f2ae795f8ebbadce22514448da43882b
-
SHA1
5518f47319a94ebfb56521d2a1b356bdde06d00a
-
SHA256
3e00cf23fe0446f363fef2e1491429471c167933d6624c627cbea288d16a4b84
-
SHA512
05c14904498893cb3454fb370282f0eced5224afa27786b4456484de7c04e3b62e056700eb724f3a1a5246f9883bf7e4a7d130012f968249221f80c7e9c789c8
-
SSDEEP
192:Wv8nnGY+AjA87g7pSd0r7H6TlCGGWsP1oyHEqQ9Z1:DnGYm87QpS2/oCGG31FE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f2ae795f8ebbadce22514448da43882b_JaffaCakes118
Files
-
f2ae795f8ebbadce22514448da43882b_JaffaCakes118.exe windows:4 windows x86 arch:x86
7a8c31952afe9b2b0b93778fb87a228b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WriteFile
CreateProcessA
CreateFileA
GetStartupInfoA
GetModuleHandleA
advapi32
RegSetValueExA
RegOpenKeyA
RegCreateKeyA
RegCloseKey
shell32
SHGetSpecialFolderPathA
wininet
InternetQueryDataAvailable
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
HttpQueryInfoA
InternetReadFile
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
sprintf
rand
srand
time
_except_handler3
atol
??3@YAXPAX@Z
??2@YAPAXI@Z
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
_itoa
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 736B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ