Static task
static1
Behavioral task
behavioral1
Sample
f9a031e42b8a3d989ee4e4a0ca66b163_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f9a031e42b8a3d989ee4e4a0ca66b163_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f9a031e42b8a3d989ee4e4a0ca66b163_JaffaCakes118
-
Size
554KB
-
MD5
f9a031e42b8a3d989ee4e4a0ca66b163
-
SHA1
4bf762987ba161f796c7424257e205ef910424f2
-
SHA256
40454a82584fc45df3a35e62211379963ccd410bfdcd441e4037ce33f2335916
-
SHA512
3d3a952706fa0ea8787c91827f109013f00e1fd7b803424893f96b51b572bd5c18b71559410d71c90cc5fe5a093e28bc414fb7162c02a0062233a9a8ede5929c
-
SSDEEP
12288:w+8mS3Kb4F4yC1uZX7h7chL32v+P6wCoo3QWMprCsOD:wxmSdF4BwLh7c4O6fZQJgsOD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f9a031e42b8a3d989ee4e4a0ca66b163_JaffaCakes118
Files
-
f9a031e42b8a3d989ee4e4a0ca66b163_JaffaCakes118.exe windows:4 windows x86 arch:x86
e4a48d4093442cddd5a11523c94015e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
RemoveDirectoryA
Beep
Sleep
CloseHandle
DeleteFileA
CreateDirectoryA
GetTempPathA
ReadFile
SetFilePointer
GetFileSize
GetLastError
CreateFileA
GetModuleFileNameA
SetLastError
GetCommandLineA
WritePrivateProfileStringA
LocalFree
FormatMessageA
GetTempFileNameA
WriteFile
GetExitCodeProcess
OpenProcess
CreateProcessA
HeapAlloc
GetProcessHeap
HeapFree
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
user32
LoadCursorA
DispatchMessageA
PeekMessageA
SetCursor
MessageBoxA
wsprintfA
shell32
ShellExecuteA
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ