Static task
static1
Behavioral task
behavioral1
Sample
15816e46f2a093a3c738c66cf1e96ca4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
15816e46f2a093a3c738c66cf1e96ca4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
15816e46f2a093a3c738c66cf1e96ca4_JaffaCakes118
-
Size
380KB
-
MD5
15816e46f2a093a3c738c66cf1e96ca4
-
SHA1
69e070a73d3dafbef99caf2c8f8cb88673fc6b5c
-
SHA256
c1300e5e0ad802cd3f2612fea8ecc1d41a12325e28fb8b17d018c1955f05579d
-
SHA512
b260fd74b5f25d0efc4061f3f89f2b2d19e89f038b658e5541a121ed359618f11b576623a75131b100e798ca815e5f5f8292a77bb4c52708c878eb2df904cb62
-
SSDEEP
6144:SHJ6MWoVzpT1Z7emqfjFmMlBRUCmSplt6u9xg81PGktaPe8MohSHUP9S:SsrorbeVlBGFS7r9xg8HgjGME
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 15816e46f2a093a3c738c66cf1e96ca4_JaffaCakes118
Files
-
15816e46f2a093a3c738c66cf1e96ca4_JaffaCakes118.exe windows:4 windows x86 arch:x86
2e0edc215c569349c418e61c9aa432b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
Sleep
CloseHandle
DeleteFileA
CreateDirectoryA
GetTempPathA
ReadFile
SetFilePointer
GetFileSize
GetLastError
CreateFileA
GetModuleFileNameA
SetLastError
GetCommandLineA
WritePrivateProfileStringA
LocalFree
FormatMessageA
GetTempFileNameA
WriteFile
GetExitCodeProcess
OpenProcess
CreateProcessA
HeapAlloc
GetProcessHeap
HeapFree
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
user32
SetCursor
LoadCursorA
DispatchMessageA
PeekMessageA
wsprintfA
MessageBoxA
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ