Static task
static1
Behavioral task
behavioral1
Sample
3771dcf80978965feee631e75122a6e8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3771dcf80978965feee631e75122a6e8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3771dcf80978965feee631e75122a6e8_JaffaCakes118
-
Size
14KB
-
MD5
3771dcf80978965feee631e75122a6e8
-
SHA1
0cd5c765052524417e9ac16a625397a5dabc784e
-
SHA256
f37bcbb714a59f319bc99673adeff1872a064428213876e70ed5aa53b396b5ba
-
SHA512
157cfd585ddc2d9aba9f59603ac2e0f67da54d96c089f752d61657fb1eef0d62f09b500da3bb84d6912355bbd6c900e9efe836cdd5e2786616486384d41673bb
-
SSDEEP
192:jXko/oN5DWlHbLdTjK6mIms84nL5EBnGC5NfPXcU7EwJn6TXIfRXS0n0eH/P1oy:4o/oNtObpmEGSPWnc4rn6L50n0en1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3771dcf80978965feee631e75122a6e8_JaffaCakes118
Files
-
3771dcf80978965feee631e75122a6e8_JaffaCakes118.exe windows:4 windows x86 arch:x86
a7a8d9be8c7d3ca54725a9d493e466f2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
GetProcAddress
LoadLibraryA
lstrcatA
lstrcpyA
GetFileAttributesA
SetFileTime
CloseHandle
GetFileTime
CreateFileA
Sleep
LocalFree
WideCharToMultiByte
lstrlenW
GetCommandLineW
ExitProcess
GetLastError
GetModuleFileNameA
GetTempPathA
GetUserDefaultLangID
SetErrorMode
GetStartupInfoA
GetModuleHandleA
user32
DispatchMessageA
wsprintfA
CreateWindowExA
shell32
SHGetFolderPathA
CommandLineToArgvW
msvcrt
_strdup
_controlfp
_except_handler3
toupper
strstr
strlen
malloc
fclose
ftell
fseek
fopen
fwrite
fputs
fread
memset
sscanf
strcpy
free
strcat
abs
strrchr
strcmp
time
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_strcmpi
Sections
.bss Size: - Virtual size: 6KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE