Static task
static1
Behavioral task
behavioral1
Sample
b50b38f9b0a7c7402778098dcfb490ba_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b50b38f9b0a7c7402778098dcfb490ba_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b50b38f9b0a7c7402778098dcfb490ba_JaffaCakes118
-
Size
126KB
-
MD5
b50b38f9b0a7c7402778098dcfb490ba
-
SHA1
37f26bc30e1e891e760e8751113b57cade338e84
-
SHA256
385bcbcb718c2e52b954e04d3fcf2aa6c284ebd351e52998aa524158ee77ab88
-
SHA512
23d9a3bb1921be1b3f29cdd744c9ef9d5fe288492989ed050f7fd68aad4048e7e70cfd3ff37b11b5f41643af407380cff38c4797147c43fbe5db0425be7b56a0
-
SSDEEP
1536:wX2pRjPcWQhFzJx1iwhfSNMOd5/YQ26ZnFtQ4O9N:aYEWKFdxYwtGMiYQ5ZnFZOL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b50b38f9b0a7c7402778098dcfb490ba_JaffaCakes118
Files
-
b50b38f9b0a7c7402778098dcfb490ba_JaffaCakes118.exe windows:4 windows x86 arch:x86
57145592485609c3fcbce4ff3792c587
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleA
GlobalAlloc
GlobalFree
FreeLibrary
LoadLibraryA
CreateFileA
SetLastError
Sleep
ExitProcess
GetModuleFileNameA
GetCommandLineA
CreateThread
GetFileSize
ReadFile
GetLastError
CloseHandle
GetStartupInfoA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyA
msvcrt
malloc
strcpy
free
realloc
memset
strcat
strcmp
_except_handler3
strstr
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
strlen
Sections
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.erdata Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE