Static task
static1
Behavioral task
behavioral1
Sample
b5ac63b2f487b73648007a9224c4da21_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b5ac63b2f487b73648007a9224c4da21_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b5ac63b2f487b73648007a9224c4da21_JaffaCakes118
-
Size
13KB
-
MD5
b5ac63b2f487b73648007a9224c4da21
-
SHA1
e1b00b1c1db5d12fe7a48ed82bc19d233008fab1
-
SHA256
5030245d0915b6c51b68fd948145045282de27ca20c06b4296784d2238dad7f8
-
SHA512
0c7f7fc89f9d63bb38bb05d9ffb6be1d3ef8121694f9fffe8355ed45e5a5182a263ee5c3399b5addea377889b2353bc7f17c2d60797d6bb7406a6b9e67228a21
-
SSDEEP
192:Tt818kA56wFr8f+k/fJ4w8mEF1D0xUahlxC/i61+vFAZRQhbjpBKzp1mhEgU3Cz:TGQMb3Sw8HFSOanxF6YvqAHB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b5ac63b2f487b73648007a9224c4da21_JaffaCakes118
Files
-
b5ac63b2f487b73648007a9224c4da21_JaffaCakes118.exe windows:4 windows x86 arch:x86
94e541fca6528c626b3081ed7afe277b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
GetLastError
GetProcAddress
LoadLibraryA
WaitForSingleObject
CreateThread
CreateMutexA
GetVersionExA
lstrcmpiA
lstrcatA
DeleteFileA
lstrcpyA
GetTempFileNameA
GetTempPathA
Sleep
WinExec
lstrlenA
GetTickCount
ReadFile
SetFilePointer
CreateFileA
WriteFile
CloseHandle
GetCurrentProcess
GetSystemDirectoryA
user32
FindWindowA
wsprintfA
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
RegSetValueExA
RegCreateKeyA
RegCloseKey
wininet
InternetReadFile
InternetCloseHandle
DeleteUrlCacheEntry
InternetOpenUrlA
InternetOpenA
msvcp60
??1_Winit@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@XZ
?open@?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAEPAV12@PBDH@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
??1?$basic_ifstream@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?getline@std@@YAAAV?$basic_istream@DU?$char_traits@D@std@@@1@AAV21@AAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
shell32
ShellExecuteA
msvcrt
strcat
__CxxFrameHandler
_itoa
_except_handler3
_onexit
__dllonexit
sprintf
strcpy
strlen
memcpy
memset
malloc
strchr
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls0 Size: 1024B - Virtual size: 943B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.reloc Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ