Static task
static1
Behavioral task
behavioral1
Sample
0669c9073a18a5f0b7b12c7f9b4a8066_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0669c9073a18a5f0b7b12c7f9b4a8066_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0669c9073a18a5f0b7b12c7f9b4a8066_JaffaCakes118
-
Size
34KB
-
MD5
0669c9073a18a5f0b7b12c7f9b4a8066
-
SHA1
838a387dd15dc959c10379da5750a4ef9f2ebeb9
-
SHA256
649600739e02edaadad680ff4b961ee9e7aaadb7a16afabe84bdd32fa84bd46e
-
SHA512
2400eda4c39ba7bca1a3553c64e86a310de9c63ca69298666b316c989115bf72ee3b82942ff08c10e2fec4b961c8e1bd2b129a33c585db962b1ed0caf48895fb
-
SSDEEP
384:EguRQAIrD9TeWc6WMYftHY7+Tvpz1qHRKQt:Egu4peWYlHnvpx2RK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0669c9073a18a5f0b7b12c7f9b4a8066_JaffaCakes118
Files
-
0669c9073a18a5f0b7b12c7f9b4a8066_JaffaCakes118.exe windows:4 windows x86 arch:x86
ca5101ba73066a8cde02d19de5dfd54b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegEnumValueA
RegOpenKeyA
RegSetValueExA
kernel32
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WideCharToMultiByte
GetCPInfo
GetACP
GetOEMCP
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
WriteFile
HeapFree
HeapAlloc
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
VirtualAlloc
GetProcAddress
LoadLibraryA
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE