Static task
static1
Behavioral task
behavioral1
Sample
67fa49a044bba99a5b437ca06792ae30_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
67fa49a044bba99a5b437ca06792ae30_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
67fa49a044bba99a5b437ca06792ae30_JaffaCakes118
-
Size
44KB
-
MD5
67fa49a044bba99a5b437ca06792ae30
-
SHA1
7f272f0e58199fe9eb0b56fa521782871367d839
-
SHA256
f895922e3b1d5e943ee6345df09030a74c7511595acc811c056f9777a4823f5b
-
SHA512
a36cf5f6b0a07a1574384fc547df6b160d77169cdf5dd6ce09f8dd87d437cf2dc69c19b3b723d9e5703976a347dfde373fb3998d0541a9d3a0ac1fb0da880a33
-
SSDEEP
384:uxt2HYK5wvbLL8Ef/+/RaFm8aQcxq/XnZ5FC9HAXdyLlQJS9oX9Ctlin7:Fjir8Ef/+/hQnZ5kMiQJS96otli7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67fa49a044bba99a5b437ca06792ae30_JaffaCakes118
Files
-
67fa49a044bba99a5b437ca06792ae30_JaffaCakes118.exe windows:4 windows x86 arch:x86
2f9bc8b0c5a375730749c74724b3d0f5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
GetProcAddress
LoadLibraryA
GlobalAddAtomA
Sleep
TerminateProcess
OpenProcess
GetPrivateProfileStringA
ReadFile
GetFileSize
CreateFileA
GlobalDeleteAtom
GetStartupInfoA
FreeLibrary
DeleteFileA
SetFileAttributesA
FindFirstFileA
MoveFileA
WriteFile
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
RemoveDirectoryA
GetPrivateProfileIntA
FindNextFileA
GetCurrentDirectoryA
FindClose
GetCPInfo
CloseHandle
WaitForSingleObject
WideCharToMultiByte
GetOEMCP
GetACP
GetModuleHandleA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
HeapAlloc
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetVersionExA
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
VirtualAlloc
HeapReAlloc
user32
FindWindowA
GetWindowThreadProcessId
wsprintfA
PostMessageA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shell32
SHGetFolderPathA
winmm
sndPlaySoundA
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ