Static task
static1
Behavioral task
behavioral1
Sample
66603c2c94916c498046ff70ba07e54f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
66603c2c94916c498046ff70ba07e54f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
66603c2c94916c498046ff70ba07e54f_JaffaCakes118
-
Size
24KB
-
MD5
66603c2c94916c498046ff70ba07e54f
-
SHA1
cafb8fd8ac85f80acb78e75c73032efd80546d60
-
SHA256
d7ede6ac160ad5eaac18432b814b92aefe2bcc072129f8e2f8056b651e9e1702
-
SHA512
061ad9d5b3c301dec8605a458d1cae5a373c963c0158955744215fa327ce477ab610f290b13358ec3ffd0834295e8441997e059f844fa248682bb57953296b3c
-
SSDEEP
192:wYVkQ+h1uvhvwGLSkZVzYNE3Kes3kZd3ZdcC1oyl0n3TIsJ:wYVkQCu19S+zGED11P0n30s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 66603c2c94916c498046ff70ba07e54f_JaffaCakes118
Files
-
66603c2c94916c498046ff70ba07e54f_JaffaCakes118.exe windows:4 windows x86 arch:x86
047e30d997d23fc38dd9f858761d3a6d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
DeleteUrlCacheEntry
mfc42
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord800
ord815
ord540
ord561
ord825
ord535
ord3830
ord3811
ord860
ord537
ord941
ord668
ord2770
ord922
ord356
ord858
ord924
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord2725
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord4673
ord1576
ord2818
ord1168
msvcrt
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
?terminate@@YAXXZ
_except_handler3
_onexit
__dllonexit
_setmbcp
time
srand
rand
_mbscmp
__CxxFrameHandler
_controlfp
kernel32
WriteProcessMemory
VirtualProtectEx
GetThreadContext
GetModuleFileNameA
DuplicateHandle
ExitProcess
GetLastError
GetCurrentProcess
CloseHandle
WaitForSingleObject
Sleep
DeleteFileA
CreateProcessA
ExpandEnvironmentStringsA
GetStartupInfoA
GetModuleHandleA
ResumeThread
SetThreadContext
RemoveDirectoryA
FlushInstructionCache
shell32
ShellExecuteA
urlmon
URLDownloadToFileA
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 668B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 776B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ