Static task
static1
Behavioral task
behavioral1
Sample
b6176c479b99a5b16fa7505a2090119e_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
b6176c479b99a5b16fa7505a2090119e_JaffaCakes118
-
Size
49KB
-
MD5
b6176c479b99a5b16fa7505a2090119e
-
SHA1
438641a16c33105d651f4e74e9e12e716370ac7e
-
SHA256
58da9f2ebd2ae85c384f7832d01b4a9e4a6c1977f286b8f352f33cf5e2669d80
-
SHA512
ea98bcb3ad46fb18adf513b206fbc2d12cc77930cbc307d03830a77b7261056a71a7ebdf045aff6acdd52a45d1ef83e7d9339afcdbacb0a963564f8bb001f44c
-
SSDEEP
384:jxNR77zN0w638TNFTBs16QCzOcg9FgI7qnJaNmu7z:jxN17zn66W2zONFggmE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b6176c479b99a5b16fa7505a2090119e_JaffaCakes118
Files
-
b6176c479b99a5b16fa7505a2090119e_JaffaCakes118.exe .vbs windows:4 windows x86 arch:x86 polyglot
a14da500c9a276157cb7cdff870ee523
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
crtdll
memset
strcpy
strlen
_strnicmp
strncmp
strncpy
strcat
memcpy
kernel32
GetModuleHandleA
HeapCreate
SetCurrentDirectoryA
Sleep
HeapDestroy
ExitProcess
HeapAlloc
HeapFree
InitializeCriticalSection
GetCommandLineA
GetModuleFileNameA
GetCurrentProcess
DuplicateHandle
CloseHandle
CreatePipe
GetStdHandle
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
GetTempPathA
LoadLibraryA
GetProcAddress
FreeLibrary
DeleteFileA
WriteFile
CreateFileA
GetFileSize
SetFilePointer
ReadFile
HeapReAlloc
shell32
ShellExecuteA
ShellExecuteExA
Sections
.code Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 11B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.flat Size: 1024B - Virtual size: 621B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE