Static task
static1
Behavioral task
behavioral1
Sample
66942f96c372fae947970175451ef667_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
66942f96c372fae947970175451ef667_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
66942f96c372fae947970175451ef667_JaffaCakes118
-
Size
88KB
-
MD5
66942f96c372fae947970175451ef667
-
SHA1
f2a91d7c409ba198bd4c47cd18302ddcbc51507f
-
SHA256
360bb4645e8e595a3594d4faad8df76b8bf6ad4d3d9898598f58971d74060ffd
-
SHA512
84b8e30621403a3eba2f1df77547df619e2ed7e301a492e438e49a4fb149a40f9182f5080eddaacb1960e3c994c1be80c795db08e35c2626bca8968422b2d341
-
SSDEEP
1536:ZsaOA7ccC060H+CtbknB9ZcJ7pxFBt99k+wM14lk+9H8WTf+bt:ZRBHdqnLqpbkfID08oAt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 66942f96c372fae947970175451ef667_JaffaCakes118
Files
-
66942f96c372fae947970175451ef667_JaffaCakes118.exe windows:4 windows x86 arch:x86
e1131a5696e784e88f12c46f7a1d8c8d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
_XcptFilter
__p__fmode
__set_app_type
_except_handler3
_controlfp
_exit
memset
sprintf
_snprintf
memcpy
malloc
strtok
strcmp
strcpy
free
srand
rand
__p__commode
strlen
kernel32
TerminateProcess
OutputDebugStringA
Sleep
OutputDebugStringW
FindResourceA
LoadResource
SizeofResource
LockResource
GetTickCount
GetLastError
GetModuleHandleA
GetProcAddress
GetStartupInfoA
user32
MessageBoxA
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE