Static task
static1
Behavioral task
behavioral1
Sample
b6e2df0a895e0f041307732b58866bd3_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
b6e2df0a895e0f041307732b58866bd3_JaffaCakes118
-
Size
252KB
-
MD5
b6e2df0a895e0f041307732b58866bd3
-
SHA1
f6bd17430a5a404ec035c36295c0ea6a53849d11
-
SHA256
ccdbcdf12766760cb605f9e1a140ca9cdbd315299ccdc7d735ca4864d8b5a5b8
-
SHA512
cecc41fa6178e036ea8d633014a43ef4a28aaa654afc796ed5150e900b05286a6adcb6706c37ef16bf1b43c308475bc0910fbc1ecff7655020f4ae6d727be9e1
-
SSDEEP
6144:AP7o9d/CcwUy39NgYngySfx2QI8nx8qv4GQt4N7LY:A7sCcCL6ySfm8nyGc4pY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b6e2df0a895e0f041307732b58866bd3_JaffaCakes118
Files
-
b6e2df0a895e0f041307732b58866bd3_JaffaCakes118.exe windows:4 windows x86 arch:x86
9149a8353533e2dfdd478d58d11c8bc2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetModuleHandleA
GetProcAddress
oleaut32
SysFreeString
advapi32
RegCloseKey
user32
CharNextA
gdi32
SaveDC
version
VerQueryValueA
wsock32
send
shell32
ShellExecuteA
ole32
IsEqualGUID
urlmon
URLDownloadToFileA
comctl32
ImageList_Add
wininet
FtpPutFileA
winmm
waveInOpen
rasapi32
RasEnumEntriesA
ntdll
NtUnmapViewOfSection
NtQuerySystemInformation
netapi32
Netbios
avicap32
capGetDriverDescriptionA
shfolder
SHGetFolderPathA
gdiplus
GdipFree
ws2_32
WSAIoctl
msacm32
acmStreamSize
pstorec
PStoreCreateInstance
url
InetIsOffline
Sections
.MPRESS1 Size: 244KB - Virtual size: 764KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MPRESS2 Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE