Static task
static1
Behavioral task
behavioral1
Sample
a6b85ab21ea117a49d94d13edf4c8f08_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a6b85ab21ea117a49d94d13edf4c8f08_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a6b85ab21ea117a49d94d13edf4c8f08_JaffaCakes118
-
Size
11KB
-
MD5
a6b85ab21ea117a49d94d13edf4c8f08
-
SHA1
c64903f0a3d05bbbaa4ac97cd943690686b0611b
-
SHA256
6896a224f5d7e16cf1f8660ecd1cd74330dd1d481ca74ffee132da4b7aaba23d
-
SHA512
9f6ce5c24412c88b4f6fc9d2674a1e01ffe53922e47c4d8849134c3d996d2fbe828ce21d7dbc64b1d31f572d30711835231c618ae2ae9d17d27773f6765c6687
-
SSDEEP
192:fiXiN9UU/URSlKaITjJxooJppSQsDaM/OyKNh:0i/U9KSoobpSQzURKX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a6b85ab21ea117a49d94d13edf4c8f08_JaffaCakes118
Files
-
a6b85ab21ea117a49d94d13edf4c8f08_JaffaCakes118.exe windows:4 windows x86 arch:x86
208bd77ce42c2f2815c3279bdb7a44d9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__set_app_type
__p__fmode
_adjust_fdiv
_controlfp
_access
__p__commode
__setusermatherr
_initterm
__getmainargs
__p__acmdln
exit
_XcptFilter
_exit
_mbschr
strtok
_mbsicmp
_mbsrchr
_mbsncpy
_pctype
_isctype
__mb_cur_max
_except_handler3
kernel32
GetStartupInfoA
GetModuleHandleA
_llseek
_lread
_lopen
_lclose
GetModuleFileNameA
LoadLibraryA
GetProcAddress
GetCurrentDirectoryA
GetSystemDirectoryA
lstrcatA
lstrcpyA
user32
wsprintfA
MessageBoxA
LoadStringA
advapi32
RegQueryValueA
RegOpenKeyA
RegCloseKey
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ