Static task
static1
Behavioral task
behavioral1
Sample
fd71a26718d2e809785d09fb031b3ff8_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
fd71a26718d2e809785d09fb031b3ff8_JaffaCakes118
-
Size
56KB
-
MD5
fd71a26718d2e809785d09fb031b3ff8
-
SHA1
296b90ccf53a31a5f81941a66165f24391deead7
-
SHA256
2e79e0080dbc6a41ca8f37465c9360951a5e2ed40a647ccd01cfa487f0e4d6e6
-
SHA512
bf03fe480ac017b007b254694e062dedd3eef15006066fa4df034d68dce37ee7e5ddb91bf006f33a98ba5ae20cf38ebea2672761cfaf0a0b2361bc3735b00bb2
-
SSDEEP
768:lnUzyNllyPMpg9IvhQAy5LfK/72H28jFzgD7ZDnk4DjBrWxTO2M0pTg/MztKsTJ8:+YU3IQriD2QD7hnk4fFWxTOH5mtK08
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fd71a26718d2e809785d09fb031b3ff8_JaffaCakes118
Files
-
fd71a26718d2e809785d09fb031b3ff8_JaffaCakes118.exe windows:4 windows x86 arch:x86
989ef6f9868dc9573a95866f45596db7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceA
GetEnvironmentVariableA
lstrcatA
lstrcpyA
GetShortPathNameA
LoadResource
ReleaseMutex
WaitForMultipleObjects
CreateMutexA
DeleteFileA
LockResource
SizeofResource
LoadLibraryA
GetProcAddress
GetModuleFileNameA
FreeLibrary
GetModuleHandleA
GetStartupInfoA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegDeleteKeyA
shell32
ShellExecuteA
msvcrt
free
strcpy
calloc
strlen
fclose
fwrite
fopen
malloc
strcmp
memcpy
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
strcat
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 588B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ