Static task
static1
Behavioral task
behavioral1
Sample
761db3beb0d40fd873a051f6c8e85cb4_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
761db3beb0d40fd873a051f6c8e85cb4_JaffaCakes118
-
Size
255KB
-
MD5
761db3beb0d40fd873a051f6c8e85cb4
-
SHA1
70fe471586402d4333951e99ceec9b8ce40c685e
-
SHA256
44466d9a8f9b7bb24b28b3488c604d205c10f8dbe587d01a2bc2334e6edfe070
-
SHA512
3e45a3c225fd7a4fa4aa8201e8558fc172025303d02835c87f1b658385ebb2d65fba8214055645670ba9a302cae271a187ff5c8ea1398ee80b8f41795c1e49fa
-
SSDEEP
6144:O0IZ0/J8lG4o7CJ0PgoHXIAgJWcIGdMcPLF5dT4LY5h3mbCcptXjdev:XIZIJ8lG4o5IoHaWcLdMyL/eLYHmWcpW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 761db3beb0d40fd873a051f6c8e85cb4_JaffaCakes118
Files
-
761db3beb0d40fd873a051f6c8e85cb4_JaffaCakes118.exe windows:4 windows x86 arch:x86
2c88baf86544dceb3225ec54ca6eb559
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceW
GetEnvironmentVariableW
SetFilePointer
CreateFileW
CloseHandle
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryW
LocalFileTimeToFileTime
MultiByteToWideChar
CreateDirectoryW
GetFileAttributesW
SetFileTime
WriteFile
GetModuleHandleW
GetStartupInfoW
user32
wsprintfW
shell32
ShellExecuteW
msvcrt.dll.
_XcptFilter
??2@YAPAXI@Z
__CxxFrameHandler
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
_CxxThrowException
calloc
free
malloc
wcscat
wcslen
wcscpy
wcsstr
_exit
??0exception@@QAE@ABQBD@Z
exit
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
??1type_info@@UAE@XZ
_controlfp
Sections
door Size: 1024B - Virtual size: 608B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 206KB - Virtual size: 206KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ