Static task
static1
Behavioral task
behavioral1
Sample
69bf36687b1ea8fe4b3ef239cb0c4ff6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
69bf36687b1ea8fe4b3ef239cb0c4ff6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
69bf36687b1ea8fe4b3ef239cb0c4ff6_JaffaCakes118
-
Size
68KB
-
MD5
69bf36687b1ea8fe4b3ef239cb0c4ff6
-
SHA1
5444f9a4666199e0f1966b19f584885c35db216c
-
SHA256
dee161d9c889ec4d5396a7223ff59ce7da6c5e67b28650fcba8b4542229be67e
-
SHA512
a0dab7459810dcd4a0cce83ada7bb1baf76529565c9ae81c21ab2c714f701de0c0a938fc7879faf5868d8079b19b2ab4477a3ec3f8c5d841d112676414d10604
-
SSDEEP
1536:gmC0XSgWVMSmss1FAyWE9A/e9z584iclDlDlHSUv:bCoSbZm91FAyWE9A/az584JlJDlHS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 69bf36687b1ea8fe4b3ef239cb0c4ff6_JaffaCakes118
Files
-
69bf36687b1ea8fe4b3ef239cb0c4ff6_JaffaCakes118.exe windows:4 windows x86 arch:x86
3e88f0e8ccd8d511ea7eed8b6ec9e643
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
uniansi
FormatMessageW
GetModuleFileNameW
lstrcpyW
LoadStringW
kernel32
GetUserDefaultLangID
GetModuleHandleA
GetStartupInfoA
MultiByteToWideChar
lstrlenA
lstrcmpA
user32
MessageBoxW
ole32
CoInitialize
CLSIDFromProgID
CoCreateInstance
CoUninitialize
oleaut32
SysAllocStringLen
SysAllocString
SysFreeString
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
exit
_exit
_acmdln
_XcptFilter
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 53KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xjrewqx Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE