Static task
static1
Behavioral task
behavioral1
Sample
419b5b8edfc07735cfacfe87118ca7fd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
419b5b8edfc07735cfacfe87118ca7fd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
419b5b8edfc07735cfacfe87118ca7fd_JaffaCakes118
-
Size
16KB
-
MD5
419b5b8edfc07735cfacfe87118ca7fd
-
SHA1
8dd3486064ae263083d19f57f1a50b07afd4e08e
-
SHA256
ef6c78b1aeafadd99069afc75d1ad4627bf7cf992de98a2524f7a95b29fdd932
-
SHA512
6308291c2fa8e57bdbb9aac9c09b28ea59e8e1a74186ac8d1481f2309db5fceac1628c0b78a8b1137f64ac2b066ee8102b0b818a4399cd906f61743ee27761c8
-
SSDEEP
192:Tt9UQyG2l0WRjidIqT9pfQDvln9kTFdXH0HI5NNFKyMulSDCwm3rZFgWwKRGUQyi:Tsll0WRjOC0koFFKAYDCnbrGKRsv8cB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 419b5b8edfc07735cfacfe87118ca7fd_JaffaCakes118
Files
-
419b5b8edfc07735cfacfe87118ca7fd_JaffaCakes118.exe windows:4 windows x86 arch:x86
6aa4a5261e1e1de5929800a7ea2fa140
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
GetLastError
GetProcAddress
LoadLibraryA
WaitForSingleObject
CreateThread
CreateMutexA
lstrlenA
lstrcpynA
GetVersionExA
lstrcmpiA
DeleteFileA
GetSystemDirectoryA
lstrcpyA
TerminateProcess
Sleep
GetTempFileNameA
GetTempPathA
WinExec
GetTickCount
ReadFile
SetFilePointer
CreateFileA
WriteFile
CloseHandle
GetCurrentProcess
lstrcatA
user32
FindWindowA
wsprintfA
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCloseKey
RegSetValueExA
RegCreateKeyA
OpenProcessToken
wininet
InternetOpenUrlA
InternetCloseHandle
DeleteUrlCacheEntry
InternetOpenA
HttpQueryInfoA
InternetReadFile
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@XZ
?open@?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAEPAV12@PBDH@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
??1?$basic_ifstream@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?getline@std@@YAAAV?$basic_istream@DU?$char_traits@D@std@@@1@AAV21@AAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
shell32
ShellExecuteA
msvcrt
strcpy
sprintf
strcat
atol
__CxxFrameHandler
_itoa
_except_handler3
_onexit
__dllonexit
strchr
malloc
strlen
free
memcpy
memset
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls0 Size: 1024B - Virtual size: 1023B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.reloc Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ