Static task
static1
Behavioral task
behavioral1
Sample
fd20a48a820173dfe1f19a97b3cdf41d_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fd20a48a820173dfe1f19a97b3cdf41d_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fd20a48a820173dfe1f19a97b3cdf41d_JaffaCakes118
-
Size
15KB
-
MD5
fd20a48a820173dfe1f19a97b3cdf41d
-
SHA1
0ac81d035e258ebbc23b738560923cb49dda3062
-
SHA256
371124042cdc20783dc511bf24edd6dfd0fbccc9fa982b138be3817ca6c9b246
-
SHA512
b596024ac4fdf0c96b21ce5ec3f4807a1b54140dae0459eb7014fa070b682bcd09797613da99985f3e129240bfe6a5b6981bd4627b123cdfabbdfe0b213a4a1e
-
SSDEEP
384:C2LiVpRjmZUoV0s7QuZ5YJ6fMhm1+rLq9+Yd:C2L+jmZ0s7LgJ6fMhBLBYd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fd20a48a820173dfe1f19a97b3cdf41d_JaffaCakes118
Files
-
fd20a48a820173dfe1f19a97b3cdf41d_JaffaCakes118.exe windows:4 windows x86 arch:x86
6714d37bfdc7d6da6aaaa8b519942d42
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
ReadFile
CreateFileA
GetTempPathA
Sleep
SystemTimeToFileTime
GetLocalTime
GetModuleFileNameA
ExitProcess
GetModuleHandleA
GetCommandLineA
LoadLibraryA
GetProcAddress
FileTimeToSystemTime
GetLastError
ReleaseMutex
CreateMutexA
GetLocaleInfoA
GetSystemDefaultLCID
GetVolumeInformationA
GetWindowsDirectoryA
lstrcpynA
DeleteFileA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
CompareFileTime
lstrcatA
lstrcmpA
lstrlenA
lstrcpyA
HeapReAlloc
HeapFree
GetProcessHeap
HeapAlloc
user32
CharUpperA
wsprintfA
advapi32
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyA
RegDeleteValueA
RegQueryInfoKeyA
RegEnumValueA
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE