Static task
static1
Behavioral task
behavioral1
Sample
d6b0f942e368bcbb574897b6fafbc20c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6b0f942e368bcbb574897b6fafbc20c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d6b0f942e368bcbb574897b6fafbc20c_JaffaCakes118
-
Size
192KB
-
MD5
d6b0f942e368bcbb574897b6fafbc20c
-
SHA1
80f3a6f0d5fd8b77887d1acd68f6bf94d936c257
-
SHA256
2c5570517880ec94005a865ccbda7f832b4070289323513d167c829107c00419
-
SHA512
ef37c414d2018e50d7faba77e02ab1993eeea364fd0cb1ab1a82b52ba54c105b8f83cd161480ec17e3ad25c0c185fa0c421887895376ccb9c37a5616e1dbde1b
-
SSDEEP
3072:Aczc+fLSaVAkWVijX3CYKzaccxzkUW7xKYNSNHv0B59XggOUJkXt4hD5xoB:Av+fLSaVSVi0zAzi7tS9/gOGke5G
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d6b0f942e368bcbb574897b6fafbc20c_JaffaCakes118
Files
-
d6b0f942e368bcbb574897b6fafbc20c_JaffaCakes118.exe windows:4 windows x86 arch:x86
bd00112eb33c67a23cae1536035029dc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
GetProcAddress
GetModuleHandleA
HeapAlloc
GetProcessHeap
GetLastError
Sleep
lstrcatA
lstrcpyA
ExitProcess
CreateDirectoryA
SetEnvironmentVariableA
lstrlenA
GetWindowsDirectoryA
GetTempPathA
GetCurrentDirectoryA
MoveFileA
CloseHandle
SetFileTime
GetFileTime
WriteFile
CreateFileA
FindNextFileA
FindFirstFileA
GetTickCount
GetSystemDirectoryA
lstrcmpiA
GetModuleFileNameA
WaitForSingleObject
CreateEventA
GetFileAttributesA
GetShortPathNameA
ExpandEnvironmentStringsA
OpenEventA
SetUnhandledExceptionFilter
GetCommandLineA
WideCharToMultiByte
MultiByteToWideChar
DeleteFileA
SetFileAttributesA
Process32Next
GetCurrentProcessId
Process32First
CreateToolhelp32Snapshot
LoadLibraryA
RaiseException
InterlockedExchange
LocalAlloc
FreeLibrary
GetStartupInfoA
msvcrt
srand
_ftol
??2@YAPAXI@Z
memcpy
??3@YAXPAX@Z
strcmp
__CxxFrameHandler
_CxxThrowException
strncpy
free
malloc
toupper
tolower
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
strstr
strlen
strchr
strncat
_except_handler3
memset
rand
_strnicmp
_strlwr
_stricmp
_itoa
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 164KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ