Static task
static1
Behavioral task
behavioral1
Sample
c256b868ea2fae1d13e07d12a101c60c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c256b868ea2fae1d13e07d12a101c60c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c256b868ea2fae1d13e07d12a101c60c_JaffaCakes118
-
Size
192KB
-
MD5
c256b868ea2fae1d13e07d12a101c60c
-
SHA1
92c800d6ed59d02fa67222c02faa80a7785db4ad
-
SHA256
861f947b083c37cd622baf0567b34226972eecae4ea32eb1d2057ea3da997ada
-
SHA512
b00fd0dc6243306d1c9c0ed6d29f14d7cb4d2e533887b07b86da81a170a5cf3e31c99c8f928d02d9c98ac07760f17e5c20344e76b33d5c78982f9a131d59818b
-
SSDEEP
3072:XQntkuaVvIM83zDsjBW3WyPDGJdgqtAWdbTzrNkPiNkFcOfGfly7Wxe/8eWVVRi:XSaVvIMCzDu+PaJCqtAWBaPkoVU1FV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c256b868ea2fae1d13e07d12a101c60c_JaffaCakes118
Files
-
c256b868ea2fae1d13e07d12a101c60c_JaffaCakes118.exe windows:4 windows x86 arch:x86
c62d1ce0b2e0b513f6d2152ddf30c721
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
strncpy
_CxxThrowException
__CxxFrameHandler
strcmp
strstr
strchr
strncat
memset
??2@YAPAXI@Z
memcpy
??3@YAXPAX@Z
tolower
toupper
_ftol
_itoa
_strnicmp
_strlwr
_stricmp
srand
rand
_except_handler3
malloc
free
strlen
kernel32
Process32First
LoadLibraryA
RaiseException
InterlockedExchange
LocalAlloc
FreeLibrary
GetStartupInfoA
WideCharToMultiByte
GetCommandLineA
SetUnhandledExceptionFilter
OpenEventA
ExpandEnvironmentStringsA
GetShortPathNameA
CreateEventA
WaitForSingleObject
GetModuleFileNameA
lstrcmpiA
FindFirstFileA
FindNextFileA
CreateFileA
WriteFile
GetFileTime
SetFileTime
MoveFileA
GetCurrentDirectoryA
GetTempPathA
SetEnvironmentVariableA
ExitProcess
Sleep
GetProcessHeap
HeapAlloc
GetModuleHandleA
GetProcAddress
HeapFree
GetWindowsDirectoryA
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrcpyA
lstrlenA
DeleteFileA
SetFileAttributesA
CloseHandle
Process32Next
GetCurrentProcessId
CreateToolhelp32Snapshot
GetTickCount
lstrcatA
GetSystemDirectoryA
MultiByteToWideChar
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 164KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ