Static task
static1
Behavioral task
behavioral1
Sample
aa73509569b1b2c5dbb3be6dbd700114_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aa73509569b1b2c5dbb3be6dbd700114_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aa73509569b1b2c5dbb3be6dbd700114_JaffaCakes118
-
Size
394KB
-
MD5
aa73509569b1b2c5dbb3be6dbd700114
-
SHA1
d5597a2e0edc01422abf0f7de7cdc034e328aa95
-
SHA256
7ffa00c0ee7a2ac8d9dd17ef300d99e5b9f899652728437edc21f05ddca9f35d
-
SHA512
55e7057440647d8f591d536fb77a249ad724ac35da12d1c28e25e5d39c3c22cf0ef5d0f326ee9a9fed1ac70113fb6a421a223cdd564c8fdc2ed82d4b6b0baaee
-
SSDEEP
6144:rMa75xlLM9o3V5YfcknJIvOnmKSV6wFRGElAKZnEEPbYY/o1tPvLala:I6xlw9o3V5bVKFSGSZnEEwjd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aa73509569b1b2c5dbb3be6dbd700114_JaffaCakes118
Files
-
aa73509569b1b2c5dbb3be6dbd700114_JaffaCakes118.exe windows:4 windows x86 arch:x86
34aa7164cd522f4410e5ca5d08c44f69
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegOpenKeyW
RegQueryValueExA
RegQueryValueW
RegSetValueA
kernel32
CreateFileW
ExitProcess
MapViewOfFile
SetUnhandledExceptionFilter
TerminateProcess
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
memcpy
signal
strcpy
wcscpy
user32
BeginDeferWindowPos
CallWindowProcW
CreatePopupMenu
DefFrameProcW
DefWindowProcW
DestroyAcceleratorTable
DrawMenuBar
DrawStateW
EmptyClipboard
EnumDisplaySettingsW
EnumWindows
FlashWindow
GetCapture
GetClassNameW
GetClipboardData
GetCursorPos
GetDC
GetDlgItem
GetForegroundWindow
GetMessageW
GetSysColor
GetUpdateRgn
GetWindowTextW
IsWindowEnabled
LoadCursorW
LoadIconW
LoadImageW
MessageBeep
OffsetRect
PeekMessageW
PostMessageW
PostQuitMessage
ScreenToClient
SendMessageW
SetCapture
SetCursorPos
SetForegroundWindow
SetWindowRgn
ShowCursor
ShowWindow
TrackPopupMenu
UnhookWindowsHookEx
UpdateWindow
WaitForInputIdle
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 193KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ