Static task
static1
Behavioral task
behavioral1
Sample
399e9c2dabe6a6d8e2ce684ff10cfe62_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
399e9c2dabe6a6d8e2ce684ff10cfe62_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
399e9c2dabe6a6d8e2ce684ff10cfe62_JaffaCakes118
-
Size
79KB
-
MD5
399e9c2dabe6a6d8e2ce684ff10cfe62
-
SHA1
500f9db5ca5e0767e01eea44ea94beaddec6b088
-
SHA256
0225d3b9a60383fbe46fa6036f24991af6ce103bd4a0fc57f09f5f00c15e055d
-
SHA512
e653f47e4071a82626419891849e78ba3ed49c6176422e30ed98ba505e7e5fc4f508aa731b96e19e9cdc7f3d2021d04fecb0fd9b646e34a58f60beaf1ed6118e
-
SSDEEP
768:oXuxka0VBGlD+4V0cI5s8Eygy+9kPdryFeIoAgdev6/7:quxkhVBGlHwyyzd+FeIzLs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 399e9c2dabe6a6d8e2ce684ff10cfe62_JaffaCakes118
Files
-
399e9c2dabe6a6d8e2ce684ff10cfe62_JaffaCakes118.exe windows:4 windows x86 arch:x86
87c0b120813751b434ae17def8662798
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetLastError
Sleep
GetLocaleInfoA
GetFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLocalTime
GetStartupInfoA
VirtualAlloc
VirtualQuery
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
HeapValidate
ExitProcess
RtlUnwind
GetSystemTimeAsFileTime
GetFileType
GetStdHandle
GetCurrentProcess
DuplicateHandle
SetHandleCount
GetCommandLineA
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetConsoleCtrlHandler
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE