Static task
static1
Behavioral task
behavioral1
Sample
0792fbdc1eb3a4554c9be60f26406003_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0792fbdc1eb3a4554c9be60f26406003_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0792fbdc1eb3a4554c9be60f26406003_JaffaCakes118
-
Size
25KB
-
MD5
0792fbdc1eb3a4554c9be60f26406003
-
SHA1
44a5852a7b27bbd623eb72228c7ea3303e4ff7d5
-
SHA256
13b58fcbbf457543f12955fd3697bda326b8bedc90d51d9a061c233c026c4cad
-
SHA512
fe312da86d9795ae2f13d1ba2483e0e874e94b3bc8f75748b9f899790049a72761363e36e528763b305e3246ccf245957ecc3c8970514f638c69cc9cf576ceb9
-
SSDEEP
384:8G0xZ7l11ACqfAHPwmZevw2aE2QmT2DH6mQxdy/EmtUHyMm+V5Bu5:T0xZNAnfjmn2rhmT8HKc/EmwyaK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0792fbdc1eb3a4554c9be60f26406003_JaffaCakes118
Files
-
0792fbdc1eb3a4554c9be60f26406003_JaffaCakes118.exe windows:4 windows x86 arch:x86
9dc9ed7f7dac8d8d42348cc9a6cc3ca2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_adjust_fdiv
memcpy
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
memset
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
user32
wsprintfA
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
kernel32
FindResourceA
SizeofResource
LoadResource
LockResource
VirtualAlloc
VirtualFree
FreeResource
GetModuleFileNameA
lstrcatA
CreateFileA
lstrlenA
WriteFile
CloseHandle
GetStartupInfoA
CreateProcessA
ExitProcess
GetWindowsDirectoryA
GetModuleHandleA
GetTempPathA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 444B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ