Static task
static1
Behavioral task
behavioral1
Sample
07dcfb190cf96d8334f11f0e039753b4_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
07dcfb190cf96d8334f11f0e039753b4_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
07dcfb190cf96d8334f11f0e039753b4_JaffaCakes118
-
Size
373KB
-
MD5
07dcfb190cf96d8334f11f0e039753b4
-
SHA1
c596666683011949b8611d38d1095cf533f3afe3
-
SHA256
cebab6f31fba89478f8c3e470838590bac8548c953d431382b37569e06669a34
-
SHA512
f7e89ea9eea8b70e2e9d45883b29456d58293798dfffcee5f10f4b89121c110791314a7bdbe4d6e8387972958a48b456606c927c94a0197d3247e85c4e487e35
-
SSDEEP
6144:2odFqNHbwjtXRgZp8gS3qJZigqizEaSFMPHf0MW7PrRpwIzvbYjuHt3Dus:2o/qNHbWgT8gqIqIAQ0MsrnYW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07dcfb190cf96d8334f11f0e039753b4_JaffaCakes118
Files
-
07dcfb190cf96d8334f11f0e039753b4_JaffaCakes118.exe windows:4 windows x86 arch:x86
1f2dc1a0a3ac27b0fa68cfd3a906c936
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
VirtualProtect
GetProcAddress
HeapCreate
HeapDestroy
HeapFree
HeapAlloc
RtlUnwind
LoadLibraryA
LCMapStringA
ExitProcess
CloseHandle
GetCurrentProcess
CreateFileA
user32
wsprintfA
CloseWindow
CreateWindowExA
SetWindowLongA
CharLowerBuffA
advapi32
RegCloseKey
RegOpenKeyA
RegQueryValueA
RegDeleteKeyA
RegEnumValueA
RegEnumKeyA
RegCreateKeyA
RegDeleteValueA
RegSetValueA
Sections
.text Size: 350KB - Virtual size: 352KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 76KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 17B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ