Static task
static1
Behavioral task
behavioral1
Sample
a4c9c8bbfd909422bec69ba82b60af42_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a4c9c8bbfd909422bec69ba82b60af42_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
a4c9c8bbfd909422bec69ba82b60af42_JaffaCakes118
-
Size
9KB
-
MD5
a4c9c8bbfd909422bec69ba82b60af42
-
SHA1
2c75aaa943c8914c20fbda10b034e08e0243ed18
-
SHA256
f03fc903da7623fe832108e2f15f2396ae67c15f08cdf0c06f7471e13814db9a
-
SHA512
eabdd82602c6816d1ccd8b43dc548ca8aeb3149477d43ae95486dcf40055120ae4a9468a646fbe6d5f4f59988f39620abc9e27ed749dedaa7906eb3c6da97b85
-
SSDEEP
192:7KKF1gYNWczBZe0W+YBHEOTpPZGuGEP1oynu5pFo9KB/c:+f0W+YO6YuGq1I549Km
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4c9c8bbfd909422bec69ba82b60af42_JaffaCakes118
Files
-
a4c9c8bbfd909422bec69ba82b60af42_JaffaCakes118.exe windows:4 windows x86 arch:x86
86f2932f00ea97f906c2d0b85c5c799a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_stricmp
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
strstr
strrchr
??3@YAXPAX@Z
??2@YAPAXI@Z
malloc
free
realloc
imagehlp
MakeSureDirectoryPathExists
wininet
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
kernel32
CreateProcessA
lstrcpyA
Sleep
WriteFile
CreateFileA
CloseHandle
SetFilePointer
GetFileSize
ReadFile
FreeLibrary
WaitForSingleObject
IsBadReadPtr
LoadLibraryA
GetProcAddress
VirtualFree
VirtualProtect
VirtualAlloc
GetProcessHeap
HeapAlloc
lstrlenA
GetModuleHandleA
HeapFree
CreateThread
GetStartupInfoA
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE