Static task
static1
Behavioral task
behavioral1
Sample
5f14a237ea0b42b7231a1ebb1e7bb731_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5f14a237ea0b42b7231a1ebb1e7bb731_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5f14a237ea0b42b7231a1ebb1e7bb731_JaffaCakes118
-
Size
56KB
-
MD5
5f14a237ea0b42b7231a1ebb1e7bb731
-
SHA1
501858682b6852009475c26acf15aa4afa279826
-
SHA256
822c30946add594a6f05a3f2e359ec4b6b08ac6eb65be2ed8b6de5ab12cd159f
-
SHA512
15b5b2453645d3f47d070be5aceec4726d2251a66d129001985d028ddea97a79a04179078dfce00a0184321a2c87094bfd006993fc8a22295871a6500a575c87
-
SSDEEP
768:ScwHj/hNiMMRY9XAh6tC3fMQ2zd6TIxC/j8iUUs+w7sKWdeHmtAZCiaf:tkj/WDvsp6kRUs+w7TTKiaf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5f14a237ea0b42b7231a1ebb1e7bb731_JaffaCakes118
Files
-
5f14a237ea0b42b7231a1ebb1e7bb731_JaffaCakes118.exe windows:4 windows x86 arch:x86
739a571f3c2c210648ce081416f22200
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
Process32First
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
OutputDebugStringA
ResumeThread
OpenProcess
Process32Next
CreateProcessA
CreateFileMappingA
SetFileAttributesA
WriteFile
GetModuleFileNameA
GetStartupInfoA
GetModuleHandleA
QueueUserAPC
TerminateProcess
ExpandEnvironmentStringsA
CreateFileA
GetFileSize
ReadFile
GetLastError
FormatMessageA
DeleteFileA
GetCurrentProcess
CloseHandle
Sleep
user32
GetWindowDC
gdi32
GetPixel
advapi32
RegOpenKeyExA
RegQueryValueExA
RegRestoreKeyA
RegOpenKeyA
RegSaveKeyA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
ole32
CoInitialize
CoUninitialize
msvcrt
__getmainargs
_stricmp
fclose
fwrite
fopen
??3@YAXPAX@Z
??2@YAPAXI@Z
memcpy
strlen
strcat
strstr
sprintf
strcpy
memset
_exit
_XcptFilter
exit
_acmdln
_strupr
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
psapi
GetModuleFileNameExA
EnumProcessModules
Sections
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE