Static task
static1
Behavioral task
behavioral1
Sample
6f9de6c5c8926e4fa8170c9e8889e985_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6f9de6c5c8926e4fa8170c9e8889e985_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6f9de6c5c8926e4fa8170c9e8889e985_JaffaCakes118
-
Size
58KB
-
MD5
6f9de6c5c8926e4fa8170c9e8889e985
-
SHA1
32d2b8bf058fee3fe20ff5e8ec9bb59d8dbc90ae
-
SHA256
17c1681698704c78598c021598e54aee6845703356b44529d81e343dd46355a5
-
SHA512
17f0e6fecb7e27a0a2009e2514e14dcd34148829e70f668eca1b86293610d57ed949dc903b1c0cbedff8a0c251863df16d813af709ec706c61af4c159be1c86f
-
SSDEEP
768:EasGFt033hntMiO8PCzGuT9j31oz5BjEgqzuU2Iir/A0vS3gAdhr:ETAktlO8PCBT9r1oz5REgqzu/dlwg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6f9de6c5c8926e4fa8170c9e8889e985_JaffaCakes118
Files
-
6f9de6c5c8926e4fa8170c9e8889e985_JaffaCakes118.exe windows:4 windows x86 arch:x86
8f14fe6d13fdf0079d15a650b102da26
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
lstrcatA
DeleteFileA
GetVersionExA
CreateProcessA
lstrcpyA
OpenFile
GetCurrentProcess
GetLastError
LoadLibraryA
GetProcAddress
GetWindowsDirectoryA
GetSystemDirectoryA
FreeLibrary
WaitForSingleObject
CopyFileA
GetModuleHandleA
GetEnvironmentStringsW
GetEnvironmentStrings
HeapReAlloc
CompareStringW
CompareStringA
SetEndOfFile
GetStringTypeW
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
FindFirstFileA
FindNextFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
RemoveDirectoryA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
HeapFree
CloseHandle
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
MultiByteToWideChar
FreeEnvironmentStringsW
GetStringTypeA
RtlUnwind
WideCharToMultiByte
GetCPInfo
GetACP
GetOEMCP
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
WriteFile
SetFilePointer
LCMapStringA
LCMapStringW
GetTimeZoneInformation
HeapAlloc
SetStdHandle
FlushFileBuffers
ReadFile
CreateFileA
user32
LoadStringA
MessageBoxA
wsprintfA
ExitWindowsEx
SetCursor
LoadCursorA
advapi32
RegDeleteKeyA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueA
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE