Static task
static1
Behavioral task
behavioral1
Sample
4769d3db411cf66f5d6d94c6fd054501_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4769d3db411cf66f5d6d94c6fd054501_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4769d3db411cf66f5d6d94c6fd054501_JaffaCakes118
-
Size
42KB
-
MD5
4769d3db411cf66f5d6d94c6fd054501
-
SHA1
757853ac94a00cf8175f10d0b66a3deb299578fc
-
SHA256
7687552b29faed8420a1ee00823bfeab3f25beee89bba7ea9b917511166520d9
-
SHA512
1f7faec6992959c4ca4c3abf8134c9b6202be297126c9328702afac31b9871604187ec810cbe75465b6029139b920d6d627d776ff09f7932a2fe812d05a9e0df
-
SSDEEP
768:ibARtLfVsL5s2q3KyseZUCiyu5CMYdATEL2B+5hXHiwDYcoDZi0U1isajTJMTx:iujkmd5seKCiyu5CCTESBEdDYcoFiq2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4769d3db411cf66f5d6d94c6fd054501_JaffaCakes118
Files
-
4769d3db411cf66f5d6d94c6fd054501_JaffaCakes118.exe windows:4 windows x86 arch:x86
c99cfe2bd8dd60b527e3ce7bf71b8bf8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
CloseHandle
DeviceIoControl
CreateFileW
GetSystemDirectoryA
GetVolumeInformationA
GetTempPathA
ExitProcess
TerminateProcess
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
IsBadWritePtr
GetComputerNameA
WriteFile
lstrlenA
GetVersionExA
CreateProcessA
shell32
ShellExecuteExA
SHChangeNotify
msvcrt
sprintf
_snprintf
srand
time
strncat
??3@YAXPAX@Z
rand
atoi
_except_handler3
strncpy
_strdup
__CxxFrameHandler
_itoa
msvcp60
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Xlen@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
wininet
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE