Static task
static1
Behavioral task
behavioral1
Sample
000d9a2c76e6683228fdf2b0cab069dd_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
000d9a2c76e6683228fdf2b0cab069dd_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
000d9a2c76e6683228fdf2b0cab069dd_JaffaCakes118
-
Size
38KB
-
MD5
000d9a2c76e6683228fdf2b0cab069dd
-
SHA1
1edbb663d463cbfe93c4221459509ade679845b6
-
SHA256
c2151e4094acfd635c5ba92d8fd9a741ebec2ad2486d3f0b5ff1e5615fa043cf
-
SHA512
ad931390d485790f03ee3c8e903ebddb47c1e707576730a5189ff8aae6bdc93347ffcd63c971f4cf4f464638e09fb5738ced8133952538fb59222e06b48ef90c
-
SSDEEP
768:4G45e8VFSVBbC6MXFf9rHd+Wym1hDzJTCi77JYSNcoTlX077YmA:4h5e8VFS/E+lahBCi7FYSOPYH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 000d9a2c76e6683228fdf2b0cab069dd_JaffaCakes118
Files
-
000d9a2c76e6683228fdf2b0cab069dd_JaffaCakes118.exe windows:4 windows x86 arch:x86
5d96d43196b234feef69513c216e5eae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetAdaptersInfo
msvcrt
_adjust_fdiv
__p__commode
__p__fmode
__setusermatherr
_except_handler3
_controlfp
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
__CxxFrameHandler
memcpy
time
srand
rand
memset
??2@YAPAXI@Z
??3@YAXPAX@Z
__set_app_type
kernel32
GetStartupInfoA
GetModuleFileNameA
SetFilePointer
ReadFile
lstrcpyA
LoadLibraryA
GetProcAddress
FreeLibrary
CreateFileA
WriteFile
GetSystemDirectoryA
lstrcatA
CloseHandle
GetFileTime
SetFileTime
GetModuleHandleA
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE