Static task
static1
Behavioral task
behavioral1
Sample
fc2cd973bf065cc87ec256f95e8bbea5_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fc2cd973bf065cc87ec256f95e8bbea5_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fc2cd973bf065cc87ec256f95e8bbea5_JaffaCakes118
-
Size
104KB
-
MD5
fc2cd973bf065cc87ec256f95e8bbea5
-
SHA1
e5bff49dd5b5eca4d6254dd81aa9d5ddd3c87d73
-
SHA256
d209e378f5f5eaab773b968508af951c200b49ecb6bcb273b092775088e5f31d
-
SHA512
f3f9623f18e55bf19c6250f69e386686ba3d2cf6102875c25a24d4df85091a689f61c105d4cfa4a4259c92cd990147191989288c91913faa869530831bb1c422
-
SSDEEP
768:L345EjK6b2y1sPjktVl/BJPU7L58kEFwtHALJayWfMtiK2s4IZFncD29tlfmNgvz:L3BPawbPUx8JeAtXXfdl9domhVfXHJ5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fc2cd973bf065cc87ec256f95e8bbea5_JaffaCakes118
Files
-
fc2cd973bf065cc87ec256f95e8bbea5_JaffaCakes118.exe windows:4 windows x86 arch:x86
14f6ad3a1299e00aa7552962e5a4e1a8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcp60
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?find_first_not_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?compare@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEHABV12@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?insert@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEPADPADD@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
?swap@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXAAV12@@Z
?find_first_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?compare@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEHIIPBDI@Z
?_Xran@std@@YAXXZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
?insert@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IPBDI@Z
msvcrt
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
__getmainargs
_acmdln
exit
_XcptFilter
_exit
__dllonexit
free
atoi
_CxxThrowException
srand
rand
sprintf
??2@YAPAXI@Z
__CxxFrameHandler
strcpy
strcat
memset
strlen
memcpy
_itoa
wcslen
_except_handler3
_onexit
??1type_info@@UAE@XZ
kernel32
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
GetStartupInfoA
GetModuleHandleA
InterlockedDecrement
GetCommandLineA
FreeLibrary
GetCurrentProcessId
GetUserDefaultLangID
GetUserDefaultLCID
GetVersion
IsValidCodePage
LoadLibraryA
GetProcAddress
GetUserDefaultUILanguage
GetTickCount
GetLastError
IsBadCodePtr
GetCurrentThreadId
MulDiv
LocalFree
user32
GetCursor
IsCharLowerA
GetDesktopWindow
IsMenu
GetForegroundWindow
IsCharUpperA
IsCharAlphaNumericA
IsCharAlphaA
IsWindow
GetActiveWindow
GetFocus
GetInputState
GetCapture
oleaut32
VariantClear
SysAllocString
GetErrorInfo
SysAllocStringByteLen
SysStringByteLen
SysFreeString
Sections
CODE Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 698B - Virtual size: 698B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 732B - Virtual size: 732B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ