Static task
static1
Behavioral task
behavioral1
Sample
674a335a01d1b7f1d2da560c3fc030d4_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
674a335a01d1b7f1d2da560c3fc030d4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
674a335a01d1b7f1d2da560c3fc030d4_JaffaCakes118
-
Size
192KB
-
MD5
674a335a01d1b7f1d2da560c3fc030d4
-
SHA1
e16e21cce6c176dc55fb22dbda9334efc075fc06
-
SHA256
130dcb12b0aeec3a68db7877041d1bd31048c95865f5df0ebd8ca74c5fbdda81
-
SHA512
547e5bfd63e6430a2509a6ec6ea4a71b1b0dfcbd89966d003f046d19af07d29deef66809cd9d5be55c1348e55de69782608281adb76f7d80abdad8c2c2c94204
-
SSDEEP
3072:vKSqXrJnWqbwO23efasxL6kqoI+RGogkf/2HTIM8ZL8Z9ryVYdyPzFQC30O:HUrJnWqbeefasxeLQGc3u86uYdIFQo0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 674a335a01d1b7f1d2da560c3fc030d4_JaffaCakes118
Files
-
674a335a01d1b7f1d2da560c3fc030d4_JaffaCakes118.exe windows:4 windows x86 arch:x86
6f8a21d7d26639aaab97232ee45a628d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strncmp
memset
__CxxFrameHandler
memmove
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_except_handler3
malloc
tolower
_ftol
rand
srand
_itoa
shlwapi
SHCopyKeyA
SHGetValueA
PathFileExistsA
SHDeleteKeyA
kernel32
SetFilePointer
RaiseException
InterlockedExchange
LocalAlloc
FreeLibrary
IsBadWritePtr
GetFileAttributesA
SetFileAttributesA
DeleteFileA
CreateDirectoryA
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
GetModuleFileNameA
GetCurrentThreadId
GetCommandLineA
CopyFileA
GetStartupInfoA
CreateProcessA
SetUnhandledExceptionFilter
CreateThread
GetExitCodeThread
GetTickCount
ExitThread
IsBadReadPtr
SleepEx
SetEnvironmentVariableA
GetSystemDirectoryA
ExpandEnvironmentStringsA
GetProcAddress
GetModuleHandleA
GetLastError
Sleep
ExitProcess
LoadLibraryA
GetCurrentDirectoryA
GetTempPathA
CloseHandle
WriteFile
CreateFileA
WaitForSingleObject
GetCurrentProcess
CreateEventA
user32
wsprintfA
GetActiveWindow
FlashWindow
ws2_32
closesocket
getprotobynumber
Sections
CODE Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 164KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE