Static task
static1
Behavioral task
behavioral1
Sample
24d943b7d97cde994b0a3d3eee58f7df_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
24d943b7d97cde994b0a3d3eee58f7df_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
24d943b7d97cde994b0a3d3eee58f7df_JaffaCakes118
-
Size
6KB
-
MD5
24d943b7d97cde994b0a3d3eee58f7df
-
SHA1
3edd2ce30ac100222f2b533feb64a22f20c0bcdb
-
SHA256
e5a091b05790185d7c4332f431144aed49b059dc4926850137223ef0b2c84f9a
-
SHA512
7effe4359751064576e6efad5e813aeed916c2e308f07b3f0230f4cbd501cf875c34b8a89c7e4abdc8315dabe77e43e0ebf369082da1b57203541d6a16c488c0
-
SSDEEP
96:64qRSv1r6w4BjHyhB3oUUSPQ89yZqcar0RoqLvHdp3fLqunOMl6ifs:UEdewsH6B3vMaroLj3+uni6s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 24d943b7d97cde994b0a3d3eee58f7df_JaffaCakes118
Files
-
24d943b7d97cde994b0a3d3eee58f7df_JaffaCakes118.exe windows:1 windows x86 arch:x86
ec0fd12ddc31ab199fd4cc6c243cf6d0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
kernel32
GetCommandLineA
GetCurrentProcessId
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetProcAddress
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
CreateFileA
ReadFile
RtlUnwind
SetFilePointer
WriteFile
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
crtdll
__GetMainArgs
exit
free
malloc
memset
raise
rand
signal
srand
strcat
strchr
strncpy
time
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 596B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 160B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 924B - Virtual size: 924B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE