Static task
static1
Behavioral task
behavioral1
Sample
74c8bc55dd87b40a383bacad425fb580_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
74c8bc55dd87b40a383bacad425fb580_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
74c8bc55dd87b40a383bacad425fb580_JaffaCakes118
-
Size
1.2MB
-
MD5
74c8bc55dd87b40a383bacad425fb580
-
SHA1
18680bb105ae94dc21db06209316837b5bbea454
-
SHA256
889d10f238597f44b5d1b0eada1e76f508ad2f445362026131ba8bb072a7a94d
-
SHA512
b1a11435a5bc432af76fe0d34b96146df62213662884ad41359180fa4e47097b6536e60f92c18e7c8ec7b608c5eaf655b617fff5f7d9092988c565a432d10343
-
SSDEEP
24576:0BC7Vzkd+uRuex/k21607poqbxZv76t6AyD1zmoSMEd9ij9HgOb:i6zy+XsmMD6t6AzMEd9gCOb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 74c8bc55dd87b40a383bacad425fb580_JaffaCakes118
Files
-
74c8bc55dd87b40a383bacad425fb580_JaffaCakes118.exe windows:1 windows x86 arch:x86
ec0fd12ddc31ab199fd4cc6c243cf6d0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
kernel32
GetCommandLineA
GetCurrentProcessId
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetProcAddress
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
CreateFileA
ReadFile
RtlUnwind
SetFilePointer
WriteFile
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
crtdll
__GetMainArgs
exit
free
malloc
memset
raise
rand
signal
srand
strcat
strchr
strncpy
time
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 596B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 160B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 924B - Virtual size: 924B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE