Static task
static1
Behavioral task
behavioral1
Sample
428db363116b1bb4309ada8a3e294640_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
428db363116b1bb4309ada8a3e294640_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
428db363116b1bb4309ada8a3e294640_JaffaCakes118
-
Size
40KB
-
MD5
428db363116b1bb4309ada8a3e294640
-
SHA1
b41f55c412aaf2015716f64e36ed6674acf88fce
-
SHA256
3a62efa0906e5acfe7582edf6837c84426ffc69f865ac372265546d6f1706912
-
SHA512
67abf10da65da6c01e04d487142fe3323d855c47a4be83b158cdbcf70a61e6b9f36099108b534db1d905c98a72584bf8e59667a519f76661dacb9836b6731769
-
SSDEEP
768:67Yr7XF55cFq4GnyQ8CaP+P/JI/mCFR3rxif:F3XF5qFq4GIo/uFR7Qf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 428db363116b1bb4309ada8a3e294640_JaffaCakes118
Files
-
428db363116b1bb4309ada8a3e294640_JaffaCakes118.exe windows:4 windows x86 arch:x86
5edc5c41e3b277145c0e96def04ea155
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord668
ord540
ord858
ord924
ord825
ord537
ord356
ord2770
ord2820
ord2781
ord3010
ord2822
ord3811
ord4202
ord860
ord2763
ord5683
ord4278
ord6662
ord4129
ord823
ord535
ord800
ord6283
msvcrt
rand
__p__commode
__p__fmode
__set_app_type
_controlfp
__setusermatherr
__getmainargs
_acmdln
exit
_XcptFilter
_exit
?terminate@@YAXXZ
_except_handler3
malloc
strcmp
_mbsrchr
time
srand
_adjust_fdiv
strncpy
memset
strcat
fprintf
strstr
atoi
getenv
_findfirst
_findnext
strcpy
_findclose
strlen
__CxxFrameHandler
sprintf
fopen
fgets
_mbscmp
fclose
__dllonexit
_onexit
_initterm
kernel32
GetStartupInfoA
GetProcAddress
Sleep
SleepEx
GetModuleFileNameA
CopyFileA
CreateProcessA
MultiByteToWideChar
ResumeThread
GetModuleHandleA
SetPriorityClass
GetCurrentProcess
GetCurrentThread
SetThreadPriority
CloseHandle
WriteFile
lstrlenA
lstrcpyA
CreateFileA
Process32Next
Process32First
DeleteFileA
CreateToolhelp32Snapshot
LoadLibraryA
FreeLibrary
GetCurrentProcessId
user32
SendMessageA
MessageBoxA
GetClassNameA
GetDesktopWindow
EnumChildWindows
wsprintfA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
shell32
SHGetPathFromIDListA
ShellExecuteA
SHGetSpecialFolderLocation
ole32
CoInitialize
CoCreateInstance
urlmon
URLDownloadToFileA
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ