Static task
static1
Behavioral task
behavioral1
Sample
6fc6652c2e4fbd6b3f7c12ed37ffd217_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6fc6652c2e4fbd6b3f7c12ed37ffd217_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6fc6652c2e4fbd6b3f7c12ed37ffd217_JaffaCakes118
-
Size
194KB
-
MD5
6fc6652c2e4fbd6b3f7c12ed37ffd217
-
SHA1
022c6666ba0518f0f5ac1e6c7e3bd06b4ed1d809
-
SHA256
0588f86bba3ae3113466ec1db4e6af3e8e177d2a71b00fadc92950427dcfee13
-
SHA512
a9128153fe08ce1023f980ff042f0b011d225f2ee60db48a75a83e77dced07f91824ab4386896fdff7f340bfbd5b0e99cf8b303b365072252db3637be4905872
-
SSDEEP
3072:oDiX2S5FfEtZO/UoG5oT+ID/qwnqSelkRTbwHBOrRLz:NH5eO/koswnqlORTbU6z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6fc6652c2e4fbd6b3f7c12ed37ffd217_JaffaCakes118
Files
-
6fc6652c2e4fbd6b3f7c12ed37ffd217_JaffaCakes118.exe windows:1 windows x86 arch:x86
ef94c099f2f6880a7693afedc47b34ba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_adjust_fdiv
_set_error_mode
_controlfp
_wfindnexti64
_cscanf
_ismbbkpunct
__set_app_type
__p__fmode
_wfullpath
_findnexti64
_acmdln
__p__commode
abs
_exit
_scprintf
_XcptFilter
_except_handler3
_mbcjmstojis
exit
__setusermatherr
_initterm
__getmainargs
memcpy
_adj_fpatan
kernel32
lstrcpyA
GlobalReAlloc
OpenProcess
SetEnvironmentVariableA
GetCurrentThread
CreateFileA
GetStartupInfoA
GetFileAttributesA
TlsAlloc
FileTimeToLocalFileTime
lstrcmpA
TlsFree
GetModuleHandleA
LocalFree
GetSystemTimeAsFileTime
GetConsoleMode
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ