Static task
static1
Behavioral task
behavioral1
Sample
db2d0354b0afb9a318fc7e3b1e6bf01e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db2d0354b0afb9a318fc7e3b1e6bf01e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
db2d0354b0afb9a318fc7e3b1e6bf01e_JaffaCakes118
-
Size
328KB
-
MD5
db2d0354b0afb9a318fc7e3b1e6bf01e
-
SHA1
ace5bad049b284f03545c7658b6187479b0f08ac
-
SHA256
3f8142cbe5c5895fb3a1003d68cc0b5454f1b227ad50075520c127984d38056e
-
SHA512
8e905e02b57edd453ea9ce5e19a4ef9a89537e10e11c4a58150a88b5e34b8d4fc8847c281e711f7d841669fc8ecd3d02aa8d4bf008e5e8099500f42ef36e9d79
-
SSDEEP
6144:nyLTAUKJegqYckAzKWvh5RdvJMP852tTB/AnxP:nQTAUKCYcACBJJ52tT5Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db2d0354b0afb9a318fc7e3b1e6bf01e_JaffaCakes118
Files
-
db2d0354b0afb9a318fc7e3b1e6bf01e_JaffaCakes118.exe windows:4 windows x86 arch:x86
a0f187174de1bff09c93259821976ab5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
Beep
GetVersionExA
LocalFree
InterlockedExchangeAdd
FindResourceExA
InterlockedDecrement
GetFileTime
GetLocalTime
LocalHandle
GlobalSize
LocalFlags
CreateMutexA
FindResourceA
LocalLock
GetLocaleInfoA
InterlockedExchange
GetAtomNameA
CloseHandle
SetEvent
ReadFile
CreateFileA
GetTempPathA
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
GetWindowsDirectoryA
FindClose
FindFirstFileA
CreateEventA
TerminateThread
WaitForSingleObject
GetModuleFileNameA
WriteFile
ResetEvent
WaitForMultipleObjects
GetShortPathNameA
CreateDirectoryA
GetTickCount
SetFileAttributesA
GetFileAttributesA
GetModuleHandleA
MultiByteToWideChar
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
GetDriveTypeA
GetVolumeInformationA
GetStartupInfoA
SetFilePointer
GetLongPathNameA
FindNextFileA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetExitCodeThread
msvcrt
rand
_ftol
_purecall
pow
malloc
free
wcscmp
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
__dllonexit
_onexit
_controlfp
srand
memcmp
strchr
memcpy
strrchr
_CxxThrowException
memset
strcmp
__CxxFrameHandler
sprintf
??3@YAXPAX@Z
strlen
strcpy
??2@YAPAXI@Z
strstr
_strupr
_strset
Sections
.text Size: 284KB - Virtual size: 280KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ