Static task
static1
Behavioral task
behavioral1
Sample
6159c500cbcd0096b9d7f0df28fccd6a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6159c500cbcd0096b9d7f0df28fccd6a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6159c500cbcd0096b9d7f0df28fccd6a_JaffaCakes118
-
Size
65KB
-
MD5
6159c500cbcd0096b9d7f0df28fccd6a
-
SHA1
0db2379d32ebc5640649f527efe7130f776d83a2
-
SHA256
0294f6f9d84ffa111e0d4fdd68a86e91be7ec960c3bc02e95c8ab85b8ba688d7
-
SHA512
a7180d3bcd99f3da302b64218ddf0b981a7e27fcb13736fdfc4be9214bd8e57a2d25adb5c271dfd1ac0ce958d6ee47192d4f2852444627250205d17d3625071e
-
SSDEEP
1536:giC0XSgWv1p93Z0F+6VKdCKMxdbFFnA7IMPvaM5yVEce5:nCoSfXp0F+6VKd7MxdbFZXYvB57c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6159c500cbcd0096b9d7f0df28fccd6a_JaffaCakes118
Files
-
6159c500cbcd0096b9d7f0df28fccd6a_JaffaCakes118.exe windows:4 windows x86 arch:x86
3e88f0e8ccd8d511ea7eed8b6ec9e643
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
uniansi
FormatMessageW
GetModuleFileNameW
lstrcpyW
LoadStringW
kernel32
GetUserDefaultLangID
GetModuleHandleA
GetStartupInfoA
MultiByteToWideChar
lstrlenA
lstrcmpA
user32
MessageBoxW
ole32
CoInitialize
CLSIDFromProgID
CoCreateInstance
CoUninitialize
oleaut32
SysAllocStringLen
SysAllocString
SysFreeString
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
exit
_exit
_acmdln
_XcptFilter
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
oxyymkd Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE