Static task
static1
Behavioral task
behavioral1
Sample
aaf2ab643c6ccc6db51914e677987f15_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aaf2ab643c6ccc6db51914e677987f15_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aaf2ab643c6ccc6db51914e677987f15_JaffaCakes118
-
Size
12KB
-
MD5
aaf2ab643c6ccc6db51914e677987f15
-
SHA1
f4448c6fdc4aae5490350b43b715a20258a5d91a
-
SHA256
fe7c6d4a7e212e60d701ee9a0ed57cb476a288ece6e05848f6be4549340c8e13
-
SHA512
68643cd8d6ca9340e0e141fd5410dcb79253460afbdbb1593d9a681499dbbd6abcc70b5f6075d69fc2afe278441e248d095e84859ccdfd1136a9fb3190c6543f
-
SSDEEP
192:XgbY2beDyrW0LdtA4k06cZntBEG0Wbw7Xzzf+4z7C1oyZts9EwuyCr4a1J:0YhDH+saW7XX24y1Pts9ruyCr4a1J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aaf2ab643c6ccc6db51914e677987f15_JaffaCakes118
Files
-
aaf2ab643c6ccc6db51914e677987f15_JaffaCakes118.exe windows:4 windows x86 arch:x86
edd824e710b07d9a06863622e073b692
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord2512
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord815
ord941
ord665
ord1979
ord5186
ord354
ord1247
ord2818
ord1576
ord2554
ord4486
ord6375
ord4274
ord541
ord1168
ord6143
ord801
ord5861
ord1105
ord823
ord926
ord939
ord825
ord537
ord4277
ord535
ord5683
ord540
ord860
ord4202
ord858
ord800
ord3830
ord4673
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
?terminate@@YAXXZ
_except_handler3
_onexit
__dllonexit
strcmp
__CxxFrameHandler
_setmbcp
_mbscmp
_mbsicmp
memset
kernel32
TerminateProcess
GetExitCodeProcess
GetLastError
Sleep
DeleteFileA
GetModuleHandleA
GetStartupInfoA
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
user32
OpenDesktopA
GetClassNameA
FindWindowExA
EnableWindow
EnumDesktopWindows
IsWindowVisible
GetForegroundWindow
GetWindowTextA
GetWindowThreadProcessId
SetFocus
SendMessageA
shell32
ShellExecuteA
urlmon
URLDownloadToFileA
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 712B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1016B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ