Static task
static1
Behavioral task
behavioral1
Sample
dac1ba5a86d24f43c2a3fe1f4c6da134_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dac1ba5a86d24f43c2a3fe1f4c6da134_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dac1ba5a86d24f43c2a3fe1f4c6da134_JaffaCakes118
-
Size
40KB
-
MD5
dac1ba5a86d24f43c2a3fe1f4c6da134
-
SHA1
6617498c1df698204ddd16b60307b66221e5e952
-
SHA256
4326e876458a7433dcdbbd7e61ea306e72197fa0eae8e06a68fe1820c0ee8110
-
SHA512
b9ab230d384f59eea50f6b4e7c653f4721850e2330b64a45e34bac38decf82c235457b560a489853876b2142bf9b0cfc336a4b5c98b2f5f6dcf81563db7f097a
-
SSDEEP
768:oNq5ZKSi+mPOIjgYKN1D9Zz+axugBqlmo:ow5ZKSoNjgYy1D9vHqlf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dac1ba5a86d24f43c2a3fe1f4c6da134_JaffaCakes118
Files
-
dac1ba5a86d24f43c2a3fe1f4c6da134_JaffaCakes118.exe windows:4 windows x86 arch:x86
ba530c239aca1c94e5710e7e387d8063
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
FindClose
FindFirstFileA
FindNextFileA
FormatMessageA
MoveFileExA
OpenProcess
Process32Next
Process32First
GetCurrentProcessId
CreateToolhelp32Snapshot
DeleteFileA
GetLocalTime
GetWindowsDirectoryA
lstrcpynA
WriteFile
GetSystemDirectoryA
lstrcmpA
GetCommandLineA
GetVersionExA
GetCurrentProcess
WideCharToMultiByte
MultiByteToWideChar
ReadFile
SetFilePointer
GetFileSize
GetTickCount
GetCurrentThreadId
QueryPerformanceCounter
LCMapStringW
SetFileTime
CloseHandle
lstrlenA
GlobalAlloc
CreateProcessA
lstrcpyA
GlobalFree
GetSystemTimeAsFileTime
LCMapStringA
GetSystemInfo
VirtualProtect
GetLocaleInfoA
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetStartupInfoA
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
HeapReAlloc
HeapAlloc
HeapSize
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
GetCPInfo
LoadLibraryA
VirtualAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
user32
MessageBoxA
wsprintfA
advapi32
GetTokenInformation
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
OpenProcessToken
shell32
ShellExecuteExA
psapi
EnumProcessModules
GetModuleFileNameExA
Sections
.text Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE