Static task
static1
Behavioral task
behavioral1
Sample
a97b8699a16079edecaf0d2b121002bb_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a97b8699a16079edecaf0d2b121002bb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a97b8699a16079edecaf0d2b121002bb_JaffaCakes118
-
Size
20KB
-
MD5
a97b8699a16079edecaf0d2b121002bb
-
SHA1
7c6a772cad7be6c6d5d47158a9397554bbdd242b
-
SHA256
6a512a30ef64590750ae93118e4a36e7c3a5b6119cd111120b5482ac996e815d
-
SHA512
39a1ff501c0843f8d7d50f043ce217e3140b9a5e3eed0c8946df370a0e89793314e43bbee47e452b4f073a0acb6fed5b8c17ee1839409055fe5b8a50fdc503a2
-
SSDEEP
192:w1gstFKocLFPLVHr0EnVFyf/iP1oyn3Qhx:wBYRtnV4f/M1RQh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a97b8699a16079edecaf0d2b121002bb_JaffaCakes118
Files
-
a97b8699a16079edecaf0d2b121002bb_JaffaCakes118.exe windows:4 windows x86 arch:x86
be8443166cd42f0f3ec7e9dd36a1ae08
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsA
ntdll
atoi
ZwUnmapViewOfSection
RtlUnwind
user32
DefWindowProcA
PostQuitMessage
SendMessageA
RegisterClassA
MessageBoxA
wsprintfA
GetMessageA
TranslateMessage
DispatchMessageA
CreateWindowExA
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyA
shell32
ShellExecuteA
msvcirt
??1ios@@UAE@XZ
??1ofstream@@UAE@XZ
?close@ofstream@@QAEXXZ
?endl@@YAAAVostream@@AAV1@@Z
??6ostream@@QAEAAV0@PBD@Z
?open@ofstream@@QAEXPBDHH@Z
?openprot@filebuf@@2HB
??0ofstream@@QAE@XZ
??_Dofstream@@QAEXXZ
msvcrt
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_controlfp
__p___argv
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_stat
__CxxFrameHandler
_except_handler3
__p___argc
kernel32
lstrcmpiA
GetModuleHandleA
VirtualAllocEx
WriteProcessMemory
SetThreadContext
ResumeThread
ReadProcessMemory
SetFileAttributesA
lstrcpyA
CopyFileA
CreateProcessA
Sleep
GetCurrentProcessId
GetThreadContext
GetStartupInfoA
TerminateProcess
OpenProcess
GetSystemDirectoryA
GetModuleFileNameA
CloseHandle
lstrcmpA
CreateMutexA
GetLastError
lstrcatA
WaitForSingleObject
DeleteFileA
lstrcpynA
lstrlenA
GetDriveTypeA
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE