Static task
static1
Behavioral task
behavioral1
Sample
02e79b5a23afc35365c5292774d83c02_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02e79b5a23afc35365c5292774d83c02_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
02e79b5a23afc35365c5292774d83c02_JaffaCakes118
-
Size
25KB
-
MD5
02e79b5a23afc35365c5292774d83c02
-
SHA1
6f448fe3bd223091c0e1ed7079cf24cfbad24186
-
SHA256
ee4f028a73a90b6db980e2177757027ca30e345eca7797e426ed9fc7282e9113
-
SHA512
85b09e21702b2eb383e07d15d9c8d58b05f9cc207c5fa6b6dcb863cbe796ee060c75e4d9c5c9f72690960161b3997a6536fd334cac01a8dbe17c9773357d9698
-
SSDEEP
384:QCWO+BGNbiUd8VhQhAUPfjnsS5AfS5PePnZgTZ0XwkmpBtGXWDjiBrzd4wSSEb:VWO+CcIAUXjsS5AfxgBvtGmeuV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02e79b5a23afc35365c5292774d83c02_JaffaCakes118
Files
-
02e79b5a23afc35365c5292774d83c02_JaffaCakes118.exe windows:4 windows x86 arch:x86
d75457209065eaa2c2f390108c201648
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
AddAtomA
CloseHandle
CopyFileA
CreateDirectoryA
CreateFileA
CreateMutexA
CreateProcessA
CreateThread
DeleteFileA
ExitProcess
ExitThread
FindAtomA
GetAtomNameA
GetDriveTypeA
GetFileAttributesA
GetLastError
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetTempPathA
GetTickCount
GetVersionExA
LoadLibraryA
OpenProcess
ReadProcessMemory
ReleaseMutex
SetFileAttributesA
SetUnhandledExceptionFilter
Sleep
TerminateThread
VirtualAllocEx
VirtualFreeEx
WaitForSingleObject
WriteFile
WriteProcessMemory
lstrcatA
lstrlenA
msvcrt
_strcmpi
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
_snprintf
abort
atexit
atoi
fclose
fflush
fopen
fprintf
free
fwrite
getenv
malloc
memcpy
memmove
memset
printf
puts
rand
signal
sprintf
srand
strcat
strchr
strcmp
strlen
strncmp
strncpy
strrchr
strstr
strtok
system
time
user32
CreateWindowExA
DispatchMessageA
FindWindowA
FindWindowExA
GetMessageA
GetWindowThreadProcessId
KillTimer
LoadCursorA
LoadIconA
RegisterClassExA
SendMessageA
SetTimer
TranslateMessage
wininet
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
InternetCrackUrlA
InternetOpenA
ws2_32
closesocket
getsockname
ioctlsocket
socket
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 5KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE