Static task
static1
Behavioral task
behavioral1
Sample
dcd833adfcf9d7a6216396cf40cc9e38_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcd833adfcf9d7a6216396cf40cc9e38_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dcd833adfcf9d7a6216396cf40cc9e38_JaffaCakes118
-
Size
24KB
-
MD5
dcd833adfcf9d7a6216396cf40cc9e38
-
SHA1
36a8f439180b7561cab2772b3b4f6494112667b6
-
SHA256
a383ba99472a24143a918bc77a2ecae892b43f942eb9d7e96f076407ff84d70f
-
SHA512
c547eb92cb388e6532a270d34d4620f0175098c31f2d9a40a438ac8f393020fc934fb7a51de989e3c57bf511647c57338a78e5409d6a7ffe6f992996fd0ea20f
-
SSDEEP
384:aJadiGURmF5EXOVO7JgsdGQ1QgTra0qrfckK2u2Ec2hBbcmQy7dtSdjo9:e8ixqEXJgsd7DTra621Ec2hBbcVokRo9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dcd833adfcf9d7a6216396cf40cc9e38_JaffaCakes118
Files
-
dcd833adfcf9d7a6216396cf40cc9e38_JaffaCakes118.exe windows:4 windows x86 arch:x86
c9e5aad1fd6345dc1f432d38a89ef5f6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
GetTickCount
CreateProcessA
lstrcatA
lstrcmpA
CopyFileA
SetFileAttributesA
GetWindowsDirectoryA
GetSystemDirectoryA
CloseHandle
GetFileSize
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
GetComputerNameA
GetProcAddress
GetModuleHandleA
lstrcpyA
ExitProcess
GetStartupInfoA
GetCommandLineA
HeapAlloc
GetProcessHeap
RtlUnwind
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
CreateRemoteThread
GetVersionExA
OpenProcess
ReadProcessMemory
VirtualProtectEx
WriteProcessMemory
LoadLibraryA
Sleep
SetLastError
GetCurrentProcessId
ResumeThread
GetPriorityClass
VirtualAlloc
VirtualFree
lstrcmpiA
user32
wsprintfA
FindWindowA
GetWindowThreadProcessId
wvsprintfA
advapi32
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
GetUserNameA
RegSetValueExA
shlwapi
SHDeleteKeyA
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE