Static task
static1
Behavioral task
behavioral1
Sample
dcfe2047d19468fe872960cad61566f6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcfe2047d19468fe872960cad61566f6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dcfe2047d19468fe872960cad61566f6_JaffaCakes118
-
Size
45KB
-
MD5
dcfe2047d19468fe872960cad61566f6
-
SHA1
d4ab8190ca913544190b5773dfb494a3392741b6
-
SHA256
6f68176bb300971dbe54857070b33752c3deca8d1dee0d9e8ceae93e5e05a5e6
-
SHA512
35bef00f954fa3de922c56ddb2eb0f09213d49df7982c1dfdc0156a74e7a8caf2f8258956cbe342abb3c168853af5d1b3852b0bdf693e48640a4b4bda93891b6
-
SSDEEP
768:QZI+k/stnFoG5MA83RvojmuhX6BRB2mTDobTUAeT6wp:kI+jtn5V8RQBG72eDGTqX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dcfe2047d19468fe872960cad61566f6_JaffaCakes118
Files
-
dcfe2047d19468fe872960cad61566f6_JaffaCakes118.exe windows:4 windows x86 arch:x86
699da037f38f36ee9f2490330b73ffbd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
CloseHandle
DeviceIoControl
GetSystemDirectoryA
GetVolumeInformationA
GetWindowsDirectoryA
ExitProcess
TerminateProcess
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
IsBadWritePtr
GetComputerNameA
WriteFile
GetFileType
GetCurrentProcessId
lstrcatA
lstrlenA
GetVersionExA
GetTempPathA
CreateProcessA
user32
FindWindowA
SendMessageA
shell32
ShellExecuteExA
SHChangeNotify
msvcrt
rand
_except_handler3
atoi
strncpy
_snprintf
__CxxFrameHandler
sprintf
srand
time
strncat
_strdup
??3@YAXPAX@Z
_itoa
msvcp60
?_Xlen@std@@YAXXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
wininet
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE