Static task
static1
Behavioral task
behavioral1
Sample
43e842d7d97755029125b9ca6582fbb4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
43e842d7d97755029125b9ca6582fbb4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
43e842d7d97755029125b9ca6582fbb4_JaffaCakes118
-
Size
24KB
-
MD5
43e842d7d97755029125b9ca6582fbb4
-
SHA1
c96dfc306dcc2cf611f07dce5a58373de996c294
-
SHA256
7a8320a1ab839d52a8de51fb59df67cc656552d18972bdf567101dab077b0edc
-
SHA512
e7bb826ed9da29af55858c7f1bf812b3cb5e12b44e720afc272a23b7cbe969f8e910ea585ebbcc5f4bfc3239c7a2c96599b835584c5e05cc856061bb21731094
-
SSDEEP
384:rpJadiGURmF5EXOVO7Jgs9LIaQ1QgTrE0qrbckK2kB2E56iB7cmQy7dtSdjo9:j8ixqEXJgs9sDTrE+2kQE56iB7cVokR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 43e842d7d97755029125b9ca6582fbb4_JaffaCakes118
Files
-
43e842d7d97755029125b9ca6582fbb4_JaffaCakes118.exe windows:4 windows x86 arch:x86
c9e5aad1fd6345dc1f432d38a89ef5f6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
GetTickCount
CreateProcessA
lstrcatA
lstrcmpA
CopyFileA
SetFileAttributesA
GetWindowsDirectoryA
GetSystemDirectoryA
CloseHandle
GetFileSize
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
GetComputerNameA
GetProcAddress
GetModuleHandleA
lstrcpyA
ExitProcess
GetStartupInfoA
GetCommandLineA
HeapAlloc
GetProcessHeap
RtlUnwind
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
CreateRemoteThread
GetVersionExA
OpenProcess
ReadProcessMemory
VirtualProtectEx
WriteProcessMemory
LoadLibraryA
Sleep
SetLastError
GetCurrentProcessId
ResumeThread
GetPriorityClass
VirtualAlloc
VirtualFree
lstrcmpiA
user32
wsprintfA
FindWindowA
GetWindowThreadProcessId
wvsprintfA
advapi32
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
GetUserNameA
RegSetValueExA
shlwapi
SHDeleteKeyA
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE