Static task
static1
Behavioral task
behavioral1
Sample
9442908da9ef6a257925dcc099a86500_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9442908da9ef6a257925dcc099a86500_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9442908da9ef6a257925dcc099a86500_JaffaCakes118
-
Size
20KB
-
MD5
9442908da9ef6a257925dcc099a86500
-
SHA1
21a986e57c722d99d3ee1d76510f78bd7df2f003
-
SHA256
22d2f4650bc4bf80c65ecf40ab57f6dc5b27fd5e235abea03283f3cd81f8f1dc
-
SHA512
36f84536be139e4c6a40c95c332b9c3a681fbdd8665ad78053283e00a3baf3a859ed2d6f57ae442cb96459823d699f4ae578f24084792d060a0bd6011547f53c
-
SSDEEP
192:Ig2g6Vpj5jbUssKqyr8geidxaHgxJwu+lX7uSi8fP1oyn6/B:P6jJUssZyFxxJwflX7pn1A/B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9442908da9ef6a257925dcc099a86500_JaffaCakes118
Files
-
9442908da9ef6a257925dcc099a86500_JaffaCakes118.exe windows:4 windows x86 arch:x86
bce8046a2555a1130a906492345daa6a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord541
ord6930
ord858
ord5683
ord939
ord536
ord940
ord801
ord1105
ord825
ord823
ord4202
ord6283
ord6282
ord540
ord4129
ord6883
ord665
ord800
ord6143
ord537
ord535
ord860
ord354
ord3790
ord2818
msvcrt
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
__p___argc
__p___argv
strncpy
atol
srand
time
rand
__CxxFrameHandler
_mbslwr
_stricmp
kernel32
WritePrivateProfileStringA
GetPrivateProfileStringA
GetSystemDirectoryA
GetModuleFileNameA
Sleep
GetTickCount
WaitForSingleObject
WinExec
MoveFileExA
GetModuleHandleA
GetStartupInfoA
GetLastError
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE