Static task
static1
Behavioral task
behavioral1
Sample
d018a1a3dcc156798df6a4430f9a6c22_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d018a1a3dcc156798df6a4430f9a6c22_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d018a1a3dcc156798df6a4430f9a6c22_JaffaCakes118
-
Size
12KB
-
MD5
d018a1a3dcc156798df6a4430f9a6c22
-
SHA1
cbc5fe7e7b5d98631b5b002839c2c0d25cad9e7e
-
SHA256
b4e8de99f6d4e35ae77fcc41717063112504a39515aaba438c4b1019dbedc86c
-
SHA512
6460f0702dece90fa9a40c11d48c3c2085e2900f90a30b244d440a20b4dcc8ef8dbedd26b48893625268a262e10a99b2c0f7594c638c7b3443b2288cd1270a1b
-
SSDEEP
192:5xBT/1ep0YeJLdytY4XJCX+m1m/5RFNw7BeGk/fnNac0Ui:5H/1ep0YeJLdK5Cx1mI7BeGk/f2U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d018a1a3dcc156798df6a4430f9a6c22_JaffaCakes118
Files
-
d018a1a3dcc156798df6a4430f9a6c22_JaffaCakes118.exe windows:4 windows x86 arch:x86
2aa3dd95ebe28e917dd2b86f54922e8f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CreateStreamOnHGlobal
kernel32
lstrcpyA
GlobalFree
CloseHandle
CreateFileA
CreateFileMappingA
ExitProcess
GetFileSize
GetModuleFileNameA
GetProcAddress
lstrlenA
LoadLibraryA
lstrcatA
WriteFile
UnmapViewOfFile
MapViewOfFile
LocalFree
LocalAlloc
GlobalAlloc
user32
MessageBoxA
oleaut32
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
advapi32
RegQueryValueExA
RegEnumValueA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegOpenKeyA
shlwapi
StrStrIA
wsock32
WSAStartup
Sections
Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 1KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nah Size: 202B - Virtual size: 256B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE