Static task
static1
Behavioral task
behavioral1
Sample
f511bb4278f2b3090dadd000a084aea2_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f511bb4278f2b3090dadd000a084aea2_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f511bb4278f2b3090dadd000a084aea2_JaffaCakes118
-
Size
6KB
-
MD5
f511bb4278f2b3090dadd000a084aea2
-
SHA1
153dc467b34eaf4165a6e8f78e70931bf56f1cd9
-
SHA256
e69eb387a508c2c8cd84cc0728615f8f84b53312b01e5c15ca4366867865b653
-
SHA512
4ac46fa1a190b9cfb5ec6a26f0358a635a54d0b6e23e73867ac61a7ae0a7c6174191c5e4e761d8f9244cb571254cde71d79338d69de97c8044075ae03432cb01
-
SSDEEP
96:uf49H6wT1Ia0v008wMePOerVG89vT7be+psTGD6yIT/snkWOQTSFH:M49amGj8OXrc85T/bsyVIT0n7TSFH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f511bb4278f2b3090dadd000a084aea2_JaffaCakes118
Files
-
f511bb4278f2b3090dadd000a084aea2_JaffaCakes118.exe windows:4 windows x86 arch:x86
a9b782030125af2606d3379336e197a8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CreateProcessA
CreateRemoteThread
ExitProcess
FormatMessageA
GetLastError
GetModuleHandleA
GetProcAddress
GetStartupInfoA
LocalFree
ResumeThread
SetUnhandledExceptionFilter
VirtualAllocEx
WriteProcessMemory
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
atexit
exit
fgetc
fwrite
printf
puts
signal
strlen
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 476B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 104B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE