Static task
static1
Behavioral task
behavioral1
Sample
690254a5d6f6f40e4512823671b310b1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
690254a5d6f6f40e4512823671b310b1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
690254a5d6f6f40e4512823671b310b1_JaffaCakes118
-
Size
24KB
-
MD5
690254a5d6f6f40e4512823671b310b1
-
SHA1
8ce96a3729a6942140bdf51e8ec299eb14e62513
-
SHA256
8787c536b564dd0e0e869923c7fac4ce2567264fbfefa519130982b797d98297
-
SHA512
46ae59e666d234fdaa24d454859c98c7caec80282356fe29df2b5cf484bcec4e93464ceb80a47754ff419a99df2f6a5880d7abac87243b55a5bdcc8dcceec7aa
-
SSDEEP
192:2E801NsmOpXO3r3rYI0axi81b3znMGZKtPNY68zxYFU1McgEhUTT2XM5arKZUQed:2E8USyUmiEbMgKrbu0GrKZGE/vZZOA6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 690254a5d6f6f40e4512823671b310b1_JaffaCakes118
Files
-
690254a5d6f6f40e4512823671b310b1_JaffaCakes118.exe windows:4 windows x86 arch:x86
c0d2fa48faf4f48b4e6971b533a6bb30
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
OpenEventA
SetEvent
Sleep
lstrcatA
DeleteFileA
lstrcpyA
GetCurrentProcess
GetModuleHandleW
GetProcAddress
CloseHandle
GetFileAttributesA
SetFileAttributesW
WinExec
SetFileAttributesA
ExitProcess
GetModuleHandleA
GetCommandLineA
OpenProcess
GetShortPathNameA
GetEnvironmentVariableA
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
CompareStringA
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
HeapFree
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
user32
MessageBoxA
ExitWindowsEx
wsprintfA
advapi32
RegDeleteValueA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyA
RegCloseKey
RegDeleteKeyA
shell32
ShellExecuteExA
Sections
.text Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE