Static task
static1
Behavioral task
behavioral1
Sample
b842ee98616cb7afb2d74886116319c7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b842ee98616cb7afb2d74886116319c7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b842ee98616cb7afb2d74886116319c7_JaffaCakes118
-
Size
20KB
-
MD5
b842ee98616cb7afb2d74886116319c7
-
SHA1
3049ede568487896fb3692a05f34a4cc246f2671
-
SHA256
b6621f01bd00a4e4a01920264d02fae5a4ff322dc66b74aae756a985cea4d5bc
-
SHA512
64467d96e191614338631af1311c929888a9eda5ceec91d1ecb53331a127504d39d1bb3de3a01bf4bed67ca2139d6056ef464022a6f42a4f4f34f7fc48945a0a
-
SSDEEP
192:Wm4n95/7H+FC3zmJdVZJt0qZFekGHsP1oyfDNqQ9Z1:Wd//7HXj6dVZJG4GS15B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b842ee98616cb7afb2d74886116319c7_JaffaCakes118
Files
-
b842ee98616cb7afb2d74886116319c7_JaffaCakes118.exe windows:4 windows x86 arch:x86
567ada3464372be746c3ac12fcea90c3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WriteFile
CreateProcessA
CreateFileA
GetStartupInfoA
GetModuleHandleA
advapi32
RegSetValueExA
RegOpenKeyA
RegCreateKeyA
RegCloseKey
shell32
SHGetSpecialFolderPathA
wininet
InternetQueryDataAvailable
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
HttpQueryInfoA
InternetReadFile
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
sprintf
rand
srand
time
isalpha
isalnum
div
ceil
atoi
_except_handler3
atol
??3@YAXPAX@Z
??2@YAPAXI@Z
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
_itoa
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ