Static task
static1
Behavioral task
behavioral1
Sample
02d60f5db70125f5e4972cdcef07eb1a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02d60f5db70125f5e4972cdcef07eb1a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
02d60f5db70125f5e4972cdcef07eb1a_JaffaCakes118
-
Size
39KB
-
MD5
02d60f5db70125f5e4972cdcef07eb1a
-
SHA1
8996f858a065c344a9d73dcf265a78ec093438d5
-
SHA256
da376444618d66d071a3561fd45820c226ee0adc1e240961c70e6893367895cc
-
SHA512
7f1807fda028446876064e1e2d5d690bac3d5e8a5199ffe46f396f00df79ef11b17771540bcd71492f9649bfefc7946eeb4e816829526461880f10f38c9194d8
-
SSDEEP
768:JCscMZOrFzi5DRiisKl4q/1RgdqSVY4HfS1qADJAb22F:XcwuBiJRiisKld/1RgMSJ3KJAi2F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02d60f5db70125f5e4972cdcef07eb1a_JaffaCakes118
Files
-
02d60f5db70125f5e4972cdcef07eb1a_JaffaCakes118.exe windows:4 windows x86 arch:x86
93b3db8e844eee43bb2305ea1d8b9aea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WaitForSingleObject
lstrcmpA
GetPrivateProfileStringA
SetEndOfFile
WriteFile
SetFilePointer
lstrlenA
SearchPathA
LoadLibraryA
CreateFileA
lstrcpyA
GetExitCodeProcess
OpenProcess
CreateProcessA
WritePrivateProfileStringA
LocalAlloc
LocalFree
GetCurrentThread
ExitProcess
SetThreadPriority
FreeLibrary
GetProcAddress
lstrcpynA
lstrcmpiA
GetModuleFileNameA
GetCommandLineA
GlobalFree
GetWindowsDirectoryA
GetStartupInfoA
ReadFile
GetFileSize
GlobalAlloc
user32
ShowWindow
CreateWindowExA
LoadStringA
MessageBoxA
FindWindowA
wsprintfA
SendMessageA
CharNextA
CharLowerA
shell32
ShellExecuteExA
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegFlushKey
RegOpenKeyA
RegCloseKey
RegCreateKeyA
RegSetValueExA
RegQueryValueExA
Sections
.text Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE