Static task
static1
Behavioral task
behavioral1
Sample
b1b1644681210033bd2342179a6c793b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b1b1644681210033bd2342179a6c793b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b1b1644681210033bd2342179a6c793b_JaffaCakes118
-
Size
15KB
-
MD5
b1b1644681210033bd2342179a6c793b
-
SHA1
4a73befc6e66631136fb9cf52c7368898880b07d
-
SHA256
b946386a77509b2208122735df7db1d23bd5ef7217789e886d9fbde54564680a
-
SHA512
75f9b422d553a13712cc69691e49c1a6288bce04e3aeeecb977342663ceaa7253515e7291dbf75e2a26ad80142683f0b4fdf2804607312b86c7d5a5ab2eacbed
-
SSDEEP
384:QJFJk84TAyhAsAJDFxPfypHzjcnHF7aADhG:oFJknTAyhE3fypHzjcnHF9DA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b1b1644681210033bd2342179a6c793b_JaffaCakes118
Files
-
b1b1644681210033bd2342179a6c793b_JaffaCakes118.exe windows:5 windows x86 arch:x86
1de83e19dd8b7ed7fb5d284fcdd2fc7b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr90
free
memcpy
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
realloc
malloc
memset
_except_handler3
wininet
InternetOpenA
DeleteUrlCacheEntry
InternetOpenUrlA
HttpQueryInfoA
InternetCloseHandle
shlwapi
PathFileExistsW
kernel32
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
lstrcpyA
CloseHandle
GetVersionExA
GetModuleFileNameA
CreateFileMappingA
LoadLibraryA
GetProcAddress
SetLastError
GetCurrentThreadId
lstrcatA
CreateFileW
GetSystemDirectoryA
GetModuleFileNameW
Sleep
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetLastError
GetCurrentProcess
CreateFileA
GetFileSize
lstrlenA
MapViewOfFile
UnmapViewOfFile
lstrcpynA
CreateProcessW
user32
wsprintfA
advapi32
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
RegQueryValueExA
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 1002B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ