Static task
static1
Behavioral task
behavioral1
Sample
29731a8dbdcba2a8b3b9aaf7bd63e25d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
29731a8dbdcba2a8b3b9aaf7bd63e25d_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
29731a8dbdcba2a8b3b9aaf7bd63e25d_JaffaCakes118
-
Size
20KB
-
MD5
29731a8dbdcba2a8b3b9aaf7bd63e25d
-
SHA1
1385220a51a60dbde045be0d1e08ffeed3707056
-
SHA256
aff9bce6dd6a57f8ec760970a2b3101a728382d4c506241c7a4197c12ea7b301
-
SHA512
7a970761be815dd7a08fa8b9410915a26a52aef9610449c0ba45985875d085d7484f61e0c09bab861aab4eb71da20f428139e89623cf08bd9ca60238d49f77f6
-
SSDEEP
384:Kvz10maihFWLsbCNRiUEicZaEMSiGRQLzRXHFviqmJrOplF1YX:KvJ0maihFWL2CNRiUEic7MSiGRQLNXHu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 29731a8dbdcba2a8b3b9aaf7bd63e25d_JaffaCakes118
Files
-
29731a8dbdcba2a8b3b9aaf7bd63e25d_JaffaCakes118.exe windows:4 windows x86 arch:x86
14d19e51aed6884b2ddbba02034b2e6e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
CreateToolhelp32Snapshot
Process32First
GetCurrentProcessId
Process32Next
OpenProcess
CloseHandle
GetLastError
GetStartupInfoA
user32
CharLowerA
advapi32
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
OpenSCManagerA
ControlService
StartServiceA
OpenServiceA
DeleteService
CreateServiceA
CloseServiceHandle
psapi
GetModuleFileNameExA
msvcrt
strcpy
strstr
sprintf
strlen
strncmp
strrchr
strcmp
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE