Static task
static1
Behavioral task
behavioral1
Sample
b216740272f83addc38dbb6b394b54c0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b216740272f83addc38dbb6b394b54c0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b216740272f83addc38dbb6b394b54c0_JaffaCakes118
-
Size
80KB
-
MD5
b216740272f83addc38dbb6b394b54c0
-
SHA1
4d40894578927f69d24726d40dff8b3c12e993af
-
SHA256
61d39d360a967c8a45e7e845f028e88fdf346bb81b9701c506d5e559505828a3
-
SHA512
7ca5e5ea10c785c934a2a385c5030404d6b0a82b2c4814ca0a542782923deb61ed55f16f893d6153201a964d5712c6459a70b1efa69339f8845f58bad296b549
-
SSDEEP
1536:xIAHuOSa+BNCDCLK4DaAszG3OoNbNDXltIzhsPAqJE+GQKCXp0PfOsBv:xIAOOz8NCDAKI9szG3TNDXDO0DH50PH1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b216740272f83addc38dbb6b394b54c0_JaffaCakes118
Files
-
b216740272f83addc38dbb6b394b54c0_JaffaCakes118.exe windows:4 windows x86 arch:x86
3e2fea4839c07e664b68b75b1fb6dae1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcp60
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?find_first_not_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?compare@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEHABV12@@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?compare@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEHIIPBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?insert@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEPADPADD@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
?swap@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXAAV12@@Z
?find_first_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?_Xran@std@@YAXXZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
?insert@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IPBDI@Z
msvcrt
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_acmdln
exit
_XcptFilter
_exit
_strlwr
_onexit
free
atoi
_CxxThrowException
srand
rand
sprintf
??2@YAPAXI@Z
strcpy
strcat
__CxxFrameHandler
strlen
memcpy
_itoa
wcslen
_except_handler3
strstr
__dllonexit
memset
??1type_info@@UAE@XZ
kernel32
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
GetStartupInfoA
GetModuleHandleA
GetTickCount
IsValidCodePage
GetUserDefaultLangID
InterlockedDecrement
IsBadCodePtr
GetCurrentProcessId
LoadLibraryA
GetProcAddress
MulDiv
GetCommandLineA
GetCurrentThreadId
GetUserDefaultLCID
GetVersion
GetLastError
GetUserDefaultUILanguage
LocalFree
user32
IsCharUpperA
GetActiveWindow
IsCharAlphaNumericA
IsCharAlphaA
GetCursor
IsWindow
IsCharLowerA
GetForegroundWindow
GetInputState
GetFocus
GetDesktopWindow
GetCapture
IsMenu
oleaut32
VariantClear
SysAllocString
GetErrorInfo
SysAllocStringByteLen
SysStringByteLen
SysFreeString
Sections
.text Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 584B - Virtual size: 584B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ