Static task
static1
Behavioral task
behavioral1
Sample
0ed761a6fec4f6672e4454dba02709ab_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0ed761a6fec4f6672e4454dba02709ab_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0ed761a6fec4f6672e4454dba02709ab_JaffaCakes118
-
Size
68KB
-
MD5
0ed761a6fec4f6672e4454dba02709ab
-
SHA1
8cc2fd69929342f9f7888edfc19d8185cad969bd
-
SHA256
16c541734d8978aad29a78adaaab0f004c5c45d1ca054252c499070622c756df
-
SHA512
1118deddd471c1d2a2cbab9f74bf921a8be85944fcb2bd8e49f242562d620b8b9e7b240072a6888f75164bb334d9f0bc3db7d04cf509a059abcecb8785290858
-
SSDEEP
1536:zG1xbBriW92cqagIj4xIY0fcOLZrilV0PUh55U:z6bBj2c3j4GYbqrUhhz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ed761a6fec4f6672e4454dba02709ab_JaffaCakes118
Files
-
0ed761a6fec4f6672e4454dba02709ab_JaffaCakes118.exe windows:4 windows x86 arch:x86
30df7e07c0a8f2e0452db50701326ada
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
CloseHandle
DeviceIoControl
GetSystemDirectoryA
GetVolumeInformationA
GetTempPathA
ExitProcess
TerminateProcess
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
IsBadWritePtr
GetComputerNameA
WriteFile
lstrlenA
GetVersionExA
CreateProcessA
user32
wsprintfA
shell32
SHChangeNotify
ShellExecuteExA
msvcrt
??3@YAXPAX@Z
__CxxFrameHandler
strncat
atoi
_except_handler3
sprintf
strncpy
_strdup
rand
_itoa
msvcp60
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Xlen@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
wininet
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 55KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE