Static task
static1
Behavioral task
behavioral1
Sample
84ee6ef8c6c4fe037c7b1e4dde08b4a0_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
84ee6ef8c6c4fe037c7b1e4dde08b4a0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
84ee6ef8c6c4fe037c7b1e4dde08b4a0_JaffaCakes118
-
Size
539KB
-
MD5
84ee6ef8c6c4fe037c7b1e4dde08b4a0
-
SHA1
d3f955ed26213858cb7ec24b9a4b3ed380674d44
-
SHA256
b292cc906fe7769ce1c478576a23188f9b77d0091ddafe81ce9b11f9214b7f28
-
SHA512
c2c6b86d9c2a2401368c47e7e76a7e6702bdfc47f7731620ae82c1db1192d3d97d489803a37223aebe4ba44403576de9321f2c684b5e02d3fb07f76fcb740e0e
-
SSDEEP
12288:76QdMLimfrhmEPm8Z4WIceENDhQdDwbiCLHEX2Eab:DmnVmEPm8mc/hQhCThEab
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 84ee6ef8c6c4fe037c7b1e4dde08b4a0_JaffaCakes118
Files
-
84ee6ef8c6c4fe037c7b1e4dde08b4a0_JaffaCakes118.exe windows:5 windows x86 arch:x86
d0bc052ab9a91f1e249039a129c90edc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__setusermatherr
_wcsicmp
_except_handler3
sprintf
_exit
__p__fmode
printf
__winitenv
wcscpy
_controlfp
strstr
__wgetmainargs
_adjust_fdiv
_c_exit
_XcptFilter
_initterm
_stricmp
_cexit
rasdlg
RasPhonebookDlgW
RasDialDlgW
kernel32
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
GetModuleHandleA
GetModuleFileNameW
GetLocaleInfoW
GetOEMCP
GetTimeZoneInformation
GetLastError
GetCPInfo
ExpandEnvironmentStringsW
GetWindowsDirectoryW
VirtualFree
GetProcAddress
LoadLibraryA
advapi32
RegOpenKeyExW
RegQueryValueExA
RegCloseKey
Sections
.fry54 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.w45yq35 Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.685498 Size: 167KB - Virtual size: 167KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 275KB - Virtual size: 275KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ