Static task
static1
Behavioral task
behavioral1
Sample
6797e9aa878bc4e9a996b68f8d87bf3b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6797e9aa878bc4e9a996b68f8d87bf3b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6797e9aa878bc4e9a996b68f8d87bf3b_JaffaCakes118
-
Size
64KB
-
MD5
6797e9aa878bc4e9a996b68f8d87bf3b
-
SHA1
43057672cd427af13186817ce485ccb86ae15a72
-
SHA256
bf74bfb1a1eb904943344b9df01e230065e55f6e6fc5cfc101955bba39318d6b
-
SHA512
2ce00483393cec192affa41780fa4fe6e21c0759b4fe23072651df0043a35ff4ecf2ac66719d51b64c9507b1a57591e4b34d22de8d3fbe257613db0cf8c73e07
-
SSDEEP
1536:X4GJORKU6Z9fa1g52bnuxJFqdM5MuupS9sxUtAFRiA9xruC:XDJxjAg5hoMvZsKcxru
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6797e9aa878bc4e9a996b68f8d87bf3b_JaffaCakes118
Files
-
6797e9aa878bc4e9a996b68f8d87bf3b_JaffaCakes118.exe windows:4 windows x86 arch:x86
62ce6fd64940d9d0afc48c88feb88256
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
CloseHandle
DeviceIoControl
GetSystemDirectoryA
GetVolumeInformationA
ExitProcess
TerminateProcess
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
IsBadWritePtr
GetComputerNameA
WriteFile
lstrlenA
lstrcatA
GetVersionExA
GetTempPathA
CreateProcessA
user32
wsprintfA
shell32
SHChangeNotify
ShellExecuteExA
msvcrt
??3@YAXPAX@Z
_snprintf
__CxxFrameHandler
strncat
atoi
_except_handler3
sprintf
strncpy
_strdup
rand
_itoa
msvcp60
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Xlen@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
wininet
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 51KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE