Static task
static1
Behavioral task
behavioral1
Sample
fdea74f3db6afa7d3e6b6d4586361903_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fdea74f3db6afa7d3e6b6d4586361903_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fdea74f3db6afa7d3e6b6d4586361903_JaffaCakes118
-
Size
60KB
-
MD5
fdea74f3db6afa7d3e6b6d4586361903
-
SHA1
b72f34758c240df644910e93d9e4d777d3789ee2
-
SHA256
b9092b17843c4c5adc87adb9dea96a6ab2c80784f4aeb949cbec6b423adc8b7b
-
SHA512
4b9913292d399f454641fc3044d659bacf6c95cd57628350709feb3706dd140ab3047789281f2b2ea1b12b60017c7786cbfac47ac1276426549ac2457b4a2e50
-
SSDEEP
768:So4+e0pi+Rgy1QzTGfTjZQaRKtblxnnsit7kt:1461gGQsea4tblVns2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fdea74f3db6afa7d3e6b6d4586361903_JaffaCakes118
Files
-
fdea74f3db6afa7d3e6b6d4586361903_JaffaCakes118.exe windows:4 windows x86 arch:x86
2de711cc410e1c08a8508e229c0d8f60
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderPathA
ShellExecuteA
msvcrt
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
_acmdln
__p__fmode
_access
_except_handler3
_controlfp
exit
_XcptFilter
_exit
strchr
strlen
strcpy
strcat
fopen
fprintf
fclose
strrchr
memset
sprintf
__p__commode
__set_app_type
kernel32
GetModuleHandleA
GetStartupInfoA
CreateFileA
CloseHandle
GetFileTime
SetFileTime
GetWindowsDirectoryA
DeleteFileA
FindFirstFileA
CopyFileA
FindNextFileA
FindClose
GetModuleFileNameA
GetVersionExA
WinExec
Sleep
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE