Static task
static1
Behavioral task
behavioral1
Sample
0c4cb216b301a86d805a22f98ee70465_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c4cb216b301a86d805a22f98ee70465_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0c4cb216b301a86d805a22f98ee70465_JaffaCakes118
-
Size
112KB
-
MD5
0c4cb216b301a86d805a22f98ee70465
-
SHA1
7015743596961acbb324187a6193797ef545beb5
-
SHA256
8431332b4394b04efb5a693eb355fb95d8419d9a83019604afb62fadae34b461
-
SHA512
9dffe627a759d73c5bc6f11d4cb69657eff2ed4ced7b2dcacba5f3e725759aedda2993c836059da97beabaede9835d6c3d8c92b1a666f4e7bf15a36ecfe83098
-
SSDEEP
3072:1nT/p5R9nsc4foY9mHAzY5xIdUrN9HplG4gsVw4eW:d/p5yujIduHHGXsVwJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c4cb216b301a86d805a22f98ee70465_JaffaCakes118
Files
-
0c4cb216b301a86d805a22f98ee70465_JaffaCakes118.exe windows:5 windows x86 arch:x86
fdc05a675d224e3c07f2d282564da353
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
sprintf
strcpy
__getmainargs
exit
_adjust_fdiv
fprintf
calloc
atoi
remove
_write
fread
_XcptFilter
__p__commode
fopen
wcslen
_acmdln
printf
memset
strlen
fclose
_cexit
__set_app_type
atexit
fwrite
_exit
_stricmp
_onexit
__setusermatherr
malloc
fseek
fputs
free
_initterm
__p__fmode
_except_handler3
strcmp
kernel32
GetConsoleMode
GetDriveTypeA
IsValidCodePage
LoadLibraryA
SetStdHandle
GetModuleHandleA
FormatMessageA
GetTimeZoneInformation
GetEnvironmentVariableA
GetModuleHandleW
DeleteFileA
IsBadWritePtr
DeleteFileW
GetLocaleInfoW
GetProcAddress
GetFileType
GetExitCodeProcess
ole32
CreateILockBytesOnHGlobal
CoTaskMemFree
CoLoadLibrary
CoDisconnectObject
CoRegisterMessageFilter
ReleaseStgMedium
shell32
SHFileOperationA
FindExecutableW
ShellExecuteA
SHGetDesktopFolder
SHGetFolderPathW
ExtractIconW
ShellExecuteEx
SHGetSpecialFolderPathW
SHAddToRecentDocs
DragFinish
SHGetDiskFreeSpaceExW
gdi32
SetMapMode
SetPolyFillMode
CreateEllipticRgn
GetTextExtentPointW
GetClipBox
CreateRoundRectRgn
GetTextExtentPointA
GetObjectW
OffsetClipRgn
StretchDIBits
advapi32
CopySid
QueryServiceStatus
RevertToSelf
LookupPrivilegeValueA
RegQueryValueExW
RegDeleteValueA
RegOpenKeyExA
RegQueryValueA
SetSecurityDescriptorOwner
RegSetValueExW
RegFlushKey
OpenServiceA
comctl32
DestroyPropertySheetPage
CreateStatusWindowA
ImageList_Destroy
ImageList_BeginDrag
ImageList_SetIconSize
ImageList_SetDragCursorImage
ImageList_ReplaceIcon
ImageList_Draw
ImageList_Remove
user32
PostQuitMessage
IsWindowVisible
DestroyMenu
LoadCursorA
GetClassNameA
IsChild
CallWindowProcA
IsWindowEnabled
GetKeyState
oleaut32
SysStringLen
SysStringByteLen
VariantCopy
SafeArrayRedim
SysAllocStringByteLen
VariantClear
SetErrorInfo
SafeArrayPutElement
SafeArrayGetElement
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 46KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 59KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE