Static task
static1
Behavioral task
behavioral1
Sample
a4a6f48e1aee22512e00ef2587d4f699_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a4a6f48e1aee22512e00ef2587d4f699_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a4a6f48e1aee22512e00ef2587d4f699_JaffaCakes118
-
Size
12KB
-
MD5
a4a6f48e1aee22512e00ef2587d4f699
-
SHA1
1d29a2b388d080b576076851a736b6f9a237c697
-
SHA256
0b3d536c27f7e403ce394a8e623c247feef108b4512048f7c4f864f3da8ddd5d
-
SHA512
5b8a4e200a584429c578e5d91eb3729c0452ced4daf253f6367106c21ce7ebfb53ba1b5acf71ce0185c7979180ce6cb48771f9b32d15a7ef32f585d2c9ef6c31
-
SSDEEP
192:RKkfkk6+BAEq3ZS3ytFJgQ4VsmOkFULbB2BvYMotUOJXsCd4Nz+FamZx3HNi2FJL:7AEaZcS7vXKULU1MKzGamZx3IIJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4a6f48e1aee22512e00ef2587d4f699_JaffaCakes118
Files
-
a4a6f48e1aee22512e00ef2587d4f699_JaffaCakes118.exe windows:4 windows x86 arch:x86
ae74e4e6d376357eae4f1a17f86c6eae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExpandEnvironmentStringsA
GetStartupInfoA
GetWindowsDirectoryA
ExitProcess
Sleep
GetLastError
lstrcmpiA
CreateProcessA
CloseHandle
SetFileAttributesA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryA
GetFileAttributesA
CopyFileA
msvcr71
sprintf
memset
memcmp
??3@YAXPAX@Z
getenv
_snprintf
__dllonexit
_onexit
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
strcpy
strlen
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 270KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE