Static task
static1
Behavioral task
behavioral1
Sample
f6b0b9fb8fe0a13f9666feb28d8110d9_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f6b0b9fb8fe0a13f9666feb28d8110d9_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f6b0b9fb8fe0a13f9666feb28d8110d9_JaffaCakes118
-
Size
22KB
-
MD5
f6b0b9fb8fe0a13f9666feb28d8110d9
-
SHA1
41c3986a7f80b45cf0e81be0f31f6b3666803992
-
SHA256
774321a8e5f73bacd9c89e13e36433a138671c9f9a7ab7fd41d0e325337be468
-
SHA512
d83bf8c7e59c24633a0ff4e886006571ce2e476f78f95c24bf128254fbdf5283ede320c7b18bfd347a1ef3e662a20db88fcb2b5ca1702b80503935afac38c530
-
SSDEEP
384:x8dlatieTMrWTQM/brGM0EJJBGjVKCKzm5L1rOzr995:2HatiEpj6M0andm5LBOF95
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f6b0b9fb8fe0a13f9666feb28d8110d9_JaffaCakes118
Files
-
f6b0b9fb8fe0a13f9666feb28d8110d9_JaffaCakes118.exe windows:4 windows x86 arch:x86
05f74346c5bd2d43502fb7b32cecd993
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetCurrentProcessId
GetCurrentThreadId
Sections
CODE Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 32B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 245B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 68B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 437B - Virtual size: 437B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 192B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ