Static task
static1
Behavioral task
behavioral1
Sample
24d468b2b84519ac867f3c4fe0a4d4f5_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
24d468b2b84519ac867f3c4fe0a4d4f5_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
24d468b2b84519ac867f3c4fe0a4d4f5_JaffaCakes118
-
Size
96KB
-
MD5
24d468b2b84519ac867f3c4fe0a4d4f5
-
SHA1
3ed008d8474e9954e7fb10b60e73fb12557a36d0
-
SHA256
6554b8000ca3207bf5c08bff70648756dc9b79809361d4b4448c4e3047c3a8ab
-
SHA512
d5b5e5ec1434898ae667d5e75f3076a2adc40ed317bdb3699ffca6b07b478676893097c16740b3d0e5293786ee1265aaf7f63b9b53da2129499946b0ccdc5c6c
-
SSDEEP
1536:ZB6erxVGdm9REAAU6G6kk467sQfsAL3iXzwv9Uht+FTctONhkH:Zz4m9xolfsIL+t+utOLy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 24d468b2b84519ac867f3c4fe0a4d4f5_JaffaCakes118
Files
-
24d468b2b84519ac867f3c4fe0a4d4f5_JaffaCakes118.exe windows:4 windows x86 arch:x86
84e9ace94a204c7fa477ed954a61fa1c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord5856
ord6648
ord6663
ord2915
ord6877
ord941
ord2614
ord540
ord800
ord823
ord860
ord825
msvcrt
_CxxThrowException
_except_handler3
strncpy
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
atoi
__CxxFrameHandler
sprintf
rand
strstr
srand
_stricmp
_strrev
kernel32
GetProcAddress
CreateThread
GetCommandLineA
GetModuleHandleA
GetStartupInfoA
LoadLibraryA
user32
GetWindow
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE