Static task
static1
Behavioral task
behavioral1
Sample
ceaab219105b500bd6104183dcf58e76_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ceaab219105b500bd6104183dcf58e76_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ceaab219105b500bd6104183dcf58e76_JaffaCakes118
-
Size
6KB
-
MD5
ceaab219105b500bd6104183dcf58e76
-
SHA1
a82cef31f6ecccca3894de112f3993b1cb54b177
-
SHA256
1a08c224b4458a69967d1e803e04cd6f1d9a510beaa02411bb4fd778bf68f1f6
-
SHA512
5e14cdd4c9bf62791c6be76bf3af98aadc4d049ff95189b3d9e6de4832fcf87cab2e917b96d752ed0676316987b1c605f17d6c763bef6d7944ad5737b949fa28
-
SSDEEP
96:FijG8lj8IPTubPdOhgKV2Xx+kp/NSzwjzuKavBDNOJ/Ot/EMZsjMhftVRHgVf+8U:Fy527zEWuLJDNOJGtjjhBoU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ceaab219105b500bd6104183dcf58e76_JaffaCakes118
Files
-
ceaab219105b500bd6104183dcf58e76_JaffaCakes118.exe windows:4 windows x86 arch:x86
3d2ea3fa120f4b53e2a1f17f4e346c2f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
FindNextFileA
GetDriveTypeA
GetFileSize
GetLogicalDriveStringsA
GetModuleFileNameA
GlobalAlloc
GlobalFree
FindClose
LocalFree
MapViewOfFile
Sleep
UnmapViewOfFile
WriteFile
lstrcatA
lstrcpyA
lstrlenA
ExitProcess
CreateFileMappingA
CreateFileA
LocalAlloc
CloseHandle
user32
wsprintfA
advapi32
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegCreateKeyA
shlwapi
StrStrIA
StrRChrIA
StrRChrA
ole32
CreateStreamOnHGlobal
wininet
InternetCloseHandle
InternetConnectA
InternetCrackUrlA
InternetOpenA
HttpSendRequestA
HttpOpenRequestA
shell32
ShellExecuteA
wsock32
gethostbyname
inet_addr
WSAStartup
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 680B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE