Static task
static1
Behavioral task
behavioral1
Sample
42236a4b4dd6975da4081170255142c7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
42236a4b4dd6975da4081170255142c7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
42236a4b4dd6975da4081170255142c7_JaffaCakes118
-
Size
178KB
-
MD5
42236a4b4dd6975da4081170255142c7
-
SHA1
1f10fe94e564e5f4e838e9c5007557093ed13cdb
-
SHA256
66f5963c52c326059749bbfb12ad383620ce712f1595e086350b020c2e94ae13
-
SHA512
03b63b754943dd0abf6a06a06cc110ed2a846ba9fca87fece1bb56fe6acd6f36591829e3708b0fd7bb145b39ca1b15173eb5dd7c182e6cdf7ea2f2d94960f27b
-
SSDEEP
3072:kCZ6do7gcj+vpkHo+fabLximNEo5JKGv8mDF9IbWLsHZkTTDTYG:k9Yj+vWJapEGEmDOWLP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42236a4b4dd6975da4081170255142c7_JaffaCakes118
Files
-
42236a4b4dd6975da4081170255142c7_JaffaCakes118.exe windows:4 windows x86 arch:x86
bff658f8b634fade7f760a469c8a9a6e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
SetCurrentDirectoryA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
WriteFile
FindNextFileA
GetModuleFileNameA
GetWindowsDirectoryA
Sleep
GetDriveTypeA
GetLocalTime
MoveFileA
DeleteFileA
WinExec
GetCurrentDirectoryA
GetFileSize
CreateFileA
GetProcAddress
LoadLibraryA
GetStringTypeW
GetStringTypeA
HeapReAlloc
VirtualAlloc
RtlUnwind
GetEnvironmentStrings
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
IsDebuggerPresent
SetFilePointer
FindClose
ReadFile
CloseHandle
SetFileAttributesA
FreeLibrary
VirtualFree
HeapFree
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
TerminateProcess
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
user32
PostQuitMessage
GetCursorPos
WindowFromPoint
GetParent
SendMessageA
shell32
SHGetFileInfoA
imagehlp
SearchTreeForFile
FindExecutableImage
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyExA
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
XOR Size: - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE