Static task
static1
Behavioral task
behavioral1
Sample
709274ba68c0b0fee3adc2039c044a13_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
709274ba68c0b0fee3adc2039c044a13_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
709274ba68c0b0fee3adc2039c044a13_JaffaCakes118
-
Size
11KB
-
MD5
709274ba68c0b0fee3adc2039c044a13
-
SHA1
4af279ef3174d7e82a059eb9dd21904b29d7f51c
-
SHA256
51eda3c0b4581cbb55bdd4e06c78019c12090c6293ae72e52b217fabc4384358
-
SHA512
70d120d85e167aed43db993cd21223ee188f4d3bf2246723660a88dfcb376176614fe1b47134beed588926177666ca2bdb60369b0218b355cbacce31a4103aea
-
SSDEEP
192:NoVsYr/K3/bxhcyUERcTuJ4ZLMkc2rge3mRWSUWUfuFNiNfuF5A6t:Nrw/K9aO4Fuc3mRWSUWUWiNuA6t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 709274ba68c0b0fee3adc2039c044a13_JaffaCakes118
Files
-
709274ba68c0b0fee3adc2039c044a13_JaffaCakes118.exe windows:5 windows x86 arch:x86
5d0e82cd3d38376d27c3d1ee2b2798bb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
exit
__set_app_type
_controlfp
_except_handler3
_cexit
_XcptFilter
_exit
__p__fmode
_c_exit
advapi32
IsTextUnicode
kernel32
WideCharToMultiByte
GetModuleHandleA
ulib
?WriteByte@STREAM@@QAEEE@Z
?Display@MESSAGE@@QAAEPBDZZ
?QueryStream@FSN_FILE@@QAEPAVFILE_STREAM@@W4STREAMACCESS@@K@Z
??1PROGRAM@@UAE@XZ
??1MULTIPLE_PATH_ARGUMENT@@UAE@XZ
??1ARRAY@@UAE@XZ
??1STREAM_MESSAGE@@UAE@XZ
??1PRINT_STREAM@@UAE@XZ
?QueryFile@SYSTEM@@SGPAVFSN_FILE@@PBVPATH@@EPAE@Z
?Initialize@PRINT_STREAM@@QAEEPBVPATH@@@Z
?Initialize@PATH@@QAEEPBGE@Z
??0PATH@@QAE@XZ
??1ARGUMENT_LEXEMIZER@@UAE@XZ
??1STRING_ARGUMENT@@UAE@XZ
??1PATH_ARGUMENT@@UAE@XZ
?IsValueSet@ARGUMENT@@QAEEXZ
??1DSTRING@@UAE@XZ
?DoParsing@ARGUMENT_LEXEMIZER@@QAEEPAVARRAY@@@Z
?Put@ARRAY@@UAEEPAVOBJECT@@@Z
?Initialize@MULTIPLE_PATH_ARGUMENT@@QAEEPADEE@Z
?Initialize@FLAG_ARGUMENT@@QAEEPAD@Z
?Initialize@LONG_ARGUMENT@@QAEEPAD@Z
?Initialize@PATH_ARGUMENT@@QAEEPADE@Z
?Initialize@STRING_ARGUMENT@@QAEEPAD@Z
?PrepareToParse@ARGUMENT_LEXEMIZER@@QAEEPAVWSTRING@@@Z
?SetCaseSensitive@ARGUMENT_LEXEMIZER@@QAEXE@Z
?PutSwitches@ARGUMENT_LEXEMIZER@@QAEXPBD@Z
?Initialize@ARGUMENT_LEXEMIZER@@QAEEPAVARRAY@@@Z
?Initialize@ARRAY@@QAEEKK@Z
?Initialize@STREAM_MESSAGE@@QAEEPAVSTREAM@@00@Z
?Get_Standard_Input_Stream@@YGPAVSTREAM@@XZ
?Get_Standard_Output_Stream@@YGPAVSTREAM@@XZ
??0PATH_ARGUMENT@@QAE@XZ
??0STRING_ARGUMENT@@QAE@XZ
??0FLAG_ARGUMENT@@QAE@XZ
??0ARRAY@@QAE@XZ
??0ARGUMENT_LEXEMIZER@@QAE@XZ
?ValidateVersion@PROGRAM@@UBEXKK@Z
?Usage@PROGRAM@@UBEXXZ
?GetStandardError@PROGRAM@@UAEPAVSTREAM@@XZ
?GetStandardOutput@PROGRAM@@UAEPAVSTREAM@@XZ
?GetStandardInput@PROGRAM@@UAEPAVSTREAM@@XZ
?Fatal@PROGRAM@@UBEXXZ
?Fatal@PROGRAM@@UBAXKKPADZZ
?DisplayMessage@PROGRAM@@UBEEKW4MESSAGE_TYPE@@@Z
?DisplayMessage@PROGRAM@@UBAEKW4MESSAGE_TYPE@@PADZZ
?Compare@OBJECT@@UBEJPBV1@@Z
??0PRINT_STREAM@@QAE@XZ
??0STREAM_MESSAGE@@QAE@XZ
??0LONG_ARGUMENT@@QAE@XZ
??0MULTIPLE_PATH_ARGUMENT@@QAE@XZ
??0PROGRAM@@IAE@XZ
?Initialize@CLASS_DESCRIPTOR@@QAEEXZ
??0CLASS_DESCRIPTOR@@QAE@XZ
??1OBJECT@@UAE@XZ
?Initialize@WSTRING@@QAEEPBDK@Z
?QueryInvalidArgument@ARGUMENT_LEXEMIZER@@QAEPAVWSTRING@@XZ
ntdll
RtlFreeHeap
RtlAllocateHeap
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE