Static task
static1
Behavioral task
behavioral1
Sample
009c0c39cf5916ad56571d69dcdbc3bc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
009c0c39cf5916ad56571d69dcdbc3bc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
009c0c39cf5916ad56571d69dcdbc3bc_JaffaCakes118
-
Size
4KB
-
MD5
009c0c39cf5916ad56571d69dcdbc3bc
-
SHA1
be4403f6a803c79a80aa26a2e83895cd4ee8e882
-
SHA256
024a07683764ee0f7dec5cf747628615def9a570ce55f38d65f5d55d5e8c61ba
-
SHA512
62b4eea16db745cc6ebc8b56516a03ebbab03fc1c6cbf8b307f3c7ede44016d73aa043f7a297bd5c8c636be4fb7dd02d7d893350e921c81188ee67ed4ed8cc40
-
SSDEEP
48:aPF3+rb/lZuhOGAHuFGqzitbB8mu6N0qvzwv7CTEnbaKyEtIZblT9LB:UFWDavNGu69E2TUynlTj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 009c0c39cf5916ad56571d69dcdbc3bc_JaffaCakes118
Files
-
009c0c39cf5916ad56571d69dcdbc3bc_JaffaCakes118.exe windows:4 windows x86 arch:x86
8219749c6aa04ae238a8b3ad3b82fc9a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetCrackUrlA
InternetOpenA
InternetConnectA
HttpOpenRequestA
InternetCloseHandle
HttpSendRequestA
shlwapi
StrStrW
rpcrt4
UuidCreate
UuidToStringA
RpcStringFreeA
kernel32
lstrlenA
GetEnvironmentVariableA
GetVersionExA
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetModuleFileNameA
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatA
lstrcpyA
GetShortPathNameA
user32
wsprintfA
advapi32
RegOpenKeyExA
RegSetValueA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
shell32
ShellExecuteExA
SHChangeNotify
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE