Static task
static1
Behavioral task
behavioral1
Sample
0d330ff12dde4a1e6d172d350066d97b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
0d330ff12dde4a1e6d172d350066d97b_JaffaCakes118
-
Size
80KB
-
MD5
0d330ff12dde4a1e6d172d350066d97b
-
SHA1
81bb71748d5f54546b22929c413fe481cccbf740
-
SHA256
2c275d1b390e315615cd51740b581e6d11ec3b53ba673f8d5a980f064462ce12
-
SHA512
407770cdc80fab769239f20fdf0b1236872a99859a6ef04ab8eb060425fdae105032c0ced98017ac8a70f5a596f187b9602f7ab9bf4bdc43eac4f8912f719f7a
-
SSDEEP
1536:6Rm3Ecs62Y8VW6eUXmraelcsd9FfOu0F0um7JEiAkykGSyXIwsx6Y:6Yrs62YGW6eUXmueKy0FOVEfNkGSy4w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d330ff12dde4a1e6d172d350066d97b_JaffaCakes118
Files
-
0d330ff12dde4a1e6d172d350066d97b_JaffaCakes118.exe windows:4 windows x86 arch:x86
15b1621765a55cc3e195c28b9a9e25c7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
HeapCreate
lstrlenA
GetFileAttributesA
VirtualQuery
GetEnvironmentVariableA
GetStartupInfoA
GetCommandLineA
CloseHandle
GetDriveTypeW
GetTimeFormatW
SetLastError
TlsGetValue
GetModuleHandleA
CreateEventW
EnumResourceTypesA
GetCommandLineA
GlobalFlags
GetConsoleTitleA
HeapDestroy
advapi32
CreateProcessAsUserA
IsValidSid
IsValidSecurityDescriptor
RegEnumKeyA
IsValidSid
IsValidAcl
InitializeSid
RegQueryValueW
IsValidSid
RegCreateKeyExW
RegDeleteValueA
IsValidSid
IsValidSid
asycfilt
FilterCreateInstance
FilterCreateInstance
FilterCreateInstance
FilterCreateInstance
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 73KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE