Static task
static1
Behavioral task
behavioral1
Sample
0a718dee5f887118faaac30800d7db8c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0a718dee5f887118faaac30800d7db8c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0a718dee5f887118faaac30800d7db8c_JaffaCakes118
-
Size
58KB
-
MD5
0a718dee5f887118faaac30800d7db8c
-
SHA1
fa322d10e684fe6b61c4bd960a935917af3d3aa4
-
SHA256
ee02f7d3e00fe5256ee35916dc515b206a8633421e40fda88f4866e00e3bff18
-
SHA512
4a687956203731c9ab4d7d53e33cdc8fa4abfb7df3e65068aad82b18ccc7e6758645b45e2c676c33392a59d1c670f23730f6901418d5bca30dcaba91393f7b30
-
SSDEEP
1536:lXhXtDJklhenitfP9DnCVaWvLZFA+tNyCOupAaRvGe:V1tDmlhoi9WRvLZFJnyCfpAag
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a718dee5f887118faaac30800d7db8c_JaffaCakes118
Files
-
0a718dee5f887118faaac30800d7db8c_JaffaCakes118.exe windows:4 windows x86 arch:x86
699da037f38f36ee9f2490330b73ffbd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
CloseHandle
DeviceIoControl
GetSystemDirectoryA
GetVolumeInformationA
GetWindowsDirectoryA
ExitProcess
TerminateProcess
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
IsBadWritePtr
GetComputerNameA
WriteFile
GetFileType
GetCurrentProcessId
lstrcatA
lstrlenA
GetVersionExA
GetTempPathA
CreateProcessA
user32
FindWindowA
SendMessageA
shell32
ShellExecuteExA
SHChangeNotify
msvcrt
rand
_except_handler3
atoi
strncpy
_snprintf
__CxxFrameHandler
sprintf
srand
time
strncat
_strdup
??3@YAXPAX@Z
_itoa
msvcp60
?_Xlen@std@@YAXXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
wininet
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 45KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE