Static task
static1
Behavioral task
behavioral1
Sample
e91710b703de0781513ff86ced4314db_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e91710b703de0781513ff86ced4314db_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e91710b703de0781513ff86ced4314db_JaffaCakes118
-
Size
4KB
-
MD5
e91710b703de0781513ff86ced4314db
-
SHA1
2cca2a1c08184cb48978f86a2c45858f4c8f17ca
-
SHA256
e9f30bb893688f8c62644d48cd85843d096dc2c5882dfc81dfe0679f07b723f3
-
SHA512
0158f7d83fe1de09ded797f03ad60aff8205bfb4393258b8495089be47275749a7e70c10de266977c060deb41b3938ce485bcb55bb5e86e3e22645ce0a8ef7e7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e91710b703de0781513ff86ced4314db_JaffaCakes118
Files
-
e91710b703de0781513ff86ced4314db_JaffaCakes118.exe windows:4 windows x86 arch:x86
084fc3d6ab1bd73ae8f49071e7e8cf60
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetProcAddress
GetVersion
GetCurrentProcessId
GetCommandLineA
ExpandEnvironmentStringsA
GetFullPathNameA
lstrlenA
GetStdHandle
CreateProcessA
LoadLibraryA
CloseHandle
ResumeThread
ExitProcess
VirtualAlloc
VirtualFree
lstrcmpiW
ReadProcessMemory
OpenProcess
lstrcmpiA
apihooks
EstablishApiHooksA
LoadAndCallA
UnloadModuleA
Sections
EliCZ's Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ApiHooks Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE