Static task
static1
Behavioral task
behavioral1
Sample
466cd65274f352d5fb93a6f01fcced7e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
466cd65274f352d5fb93a6f01fcced7e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
466cd65274f352d5fb93a6f01fcced7e_JaffaCakes118
-
Size
84KB
-
MD5
466cd65274f352d5fb93a6f01fcced7e
-
SHA1
1ba7980e22862b61ca6fe0e3d559f47e87c4bcc4
-
SHA256
4309260c7b02d246a355c1a2350dcd1e460b37a2f2c8cb0075438c7376f7fc18
-
SHA512
163f5a7bd028be3d1262a4f9600378a0a0db2154da4dce44ef3532eb5a602e10b8a7125987005afb22e52c2f372f9bcee214b35478e040aa21a73d6559f24744
-
SSDEEP
768:yO3xwVIfNaIyuKcHWD09/8XayD2iyveI78rugF87NpyPbwDi7x/wTGxPD/mB2+oc:t3hffyuvHt90qaqe87NpIbBM/lGHh8Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 466cd65274f352d5fb93a6f01fcced7e_JaffaCakes118
Files
-
466cd65274f352d5fb93a6f01fcced7e_JaffaCakes118.exe windows:4 windows x86 arch:x86
23988fcd02594f2167f90ab489776cf9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LockResource
LoadResource
FindResourceA
SizeofResource
CreateProcessA
FormatMessageA
GetLastError
Sleep
GetExitCodeProcess
SetFileAttributesA
GetFileAttributesA
GetTickCount
GetVersionExA
FreeLibrary
MultiByteToWideChar
lstrlenA
GetProcAddress
LoadLibraryA
WinExec
RemoveDirectoryA
DeleteFileA
SetFilePointer
GetFileType
DuplicateHandle
GetCurrentProcess
CreateFileA
CloseHandle
GetWindowsDirectoryA
SystemTimeToFileTime
DosDateTimeToFileTime
CreateDirectoryA
SetFileTime
WriteFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
SetStdHandle
GetDriveTypeA
GetStringTypeW
GetStringTypeA
RtlUnwind
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
SetEndOfFile
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
GetSystemDirectoryA
GetTempPathA
SetCurrentDirectoryA
ReadFile
GetCurrentDirectoryA
ExitProcess
TerminateProcess
HeapAlloc
HeapFree
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
WideCharToMultiByte
LCMapStringA
LCMapStringW
GetFullPathNameA
GetModuleFileNameA
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
user32
DefWindowProcA
DestroyWindow
BeginPaint
GetClientRect
DrawTextA
EndPaint
MessageBoxA
CreateWindowExA
ShowWindow
UpdateWindow
PostMessageA
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
PostQuitMessage
advapi32
CreateProcessAsUserA
LogonUserA
Sections
.text Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ