Static task
static1
Behavioral task
behavioral1
Sample
d053b14bf8c6c70b8545d2df0ee815d1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d053b14bf8c6c70b8545d2df0ee815d1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d053b14bf8c6c70b8545d2df0ee815d1_JaffaCakes118
-
Size
1.4MB
-
MD5
d053b14bf8c6c70b8545d2df0ee815d1
-
SHA1
abb0a572f6978f12438cdc88d349975904a54efa
-
SHA256
a3f8832370bc574c89cc656d0b466c9762dec9d07af21de31ee813b2c8e1dfaf
-
SHA512
7b466dd22d63a33cf2fd57fe963be7b6b4af2daca7892bf44cf59d6e6951f3232e3da3827194db0c9180d60d2232d7e042daab22ac2ab253aeb22c630c9545c0
-
SSDEEP
192:paoZ5SHXYV7k2w2ZXV9GyQ5slht94DMHP1oynd:JQ3F2Z7vlht94DMv13
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d053b14bf8c6c70b8545d2df0ee815d1_JaffaCakes118
Files
-
d053b14bf8c6c70b8545d2df0ee815d1_JaffaCakes118.exe windows:4 windows x86 arch:x86
8595f190d48ee0e9974e65b6b1343def
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetShortPathNameA
GetModuleFileNameA
CloseHandle
CreateProcessA
WinExec
Process32Next
Process32First
CreateToolhelp32Snapshot
GetLastError
lstrcpyA
FreeLibrary
GetExitCodeThread
TerminateThread
WaitForSingleObject
GetProcAddress
LoadLibraryA
WriteProcessMemory
OpenProcess
SetLastError
lstrcatA
GetEnvironmentVariableA
GetCurrentProcess
ExitProcess
GetModuleHandleA
CreateRemoteThread
GetStartupInfoA
GetCurrentProcessId
VirtualFree
VirtualAlloc
GetPriorityClass
ResumeThread
advapi32
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
shell32
ShellExecuteA
msvcrt
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
strstr
tolower
_exit
exit
_XcptFilter
sprintf
shlwapi
SHGetValueA
SHSetValueA
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE