Static task
static1
Behavioral task
behavioral1
Sample
29a7172d67fcc5d32faffc87cf9fec4b_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
29a7172d67fcc5d32faffc87cf9fec4b_JaffaCakes118
-
Size
100KB
-
MD5
29a7172d67fcc5d32faffc87cf9fec4b
-
SHA1
6b6ea5747fd29578e4b6ae618ebce2807266323a
-
SHA256
664536f81abc6c744a2953e022094d97ae1ddf988c67c660d64b82efef0fce07
-
SHA512
fda3738603c5dda2d0bd6fc6a638c8a44989c9d7e901231041ad416d6350ae87ef20244a2d7f9f0617beb082a8cc9fdbfd93451583715d3131f99df54ed51a3b
-
SSDEEP
1536:BQCnZjNysRCyKzViSh6+N611wntxq83hqHAFXTnBnayZMWGMV4Ufauq:BQaxy/pxT61WOiqHA5TnlPZMWzV4Yh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 29a7172d67fcc5d32faffc87cf9fec4b_JaffaCakes118
Files
-
29a7172d67fcc5d32faffc87cf9fec4b_JaffaCakes118.exe windows:4 windows x86 arch:x86
238b6fd4de329f52276bfaf6aa76946d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
memcpy
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
memcmp
memset
_except_handler3
strcpy
??2@YAPAXI@Z
strcat
??3@YAXPAX@Z
malloc
free
shlwapi
PathFindFileNameA
PathFindExtensionA
PathFileExistsA
shell32
ShellExecuteExA
SHChangeNotify
SHGetSpecialFolderPathA
kernel32
GetEnvironmentVariableA
GetVolumeInformationA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
FreeLibrary
CreateFileA
GetLastError
GetTempFileNameA
DeleteFileA
WriteFile
CloseHandle
MoveFileA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
GetShortPathNameA
GetModuleHandleA
GetStartupInfoA
SetProcessPriorityBoost
Sections
.text Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 732B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE