Static task
static1
Behavioral task
behavioral1
Sample
0d12e7c69f8cb3f4dc3fef1be533ca74_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0d12e7c69f8cb3f4dc3fef1be533ca74_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0d12e7c69f8cb3f4dc3fef1be533ca74_JaffaCakes118
-
Size
28KB
-
MD5
0d12e7c69f8cb3f4dc3fef1be533ca74
-
SHA1
bfb480c5f9e9a5d69bf252a54a33ec4d05dc448f
-
SHA256
1dd58111d41fa7aded3e1be152ce63ba8ca6c04baa784fd5c643dd2130db825f
-
SHA512
c49b0ab6c56422b4a2e3d662b54512a534fa1a491fc0996b69d88e34dcfa7ffd1b21f47d26a45547eee726ec5d396d73f4e713d4c7a5050fe3509147cb07ab15
-
SSDEEP
384:ElvXHstNu59QxdUmlH+GyywiejwSoEFlJxu:ge+KdvyJiej/FFlzu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d12e7c69f8cb3f4dc3fef1be533ca74_JaffaCakes118
Files
-
0d12e7c69f8cb3f4dc3fef1be533ca74_JaffaCakes118.exe windows:4 windows x86 arch:x86
62712d090c8100403a0e9985db7b671f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStdHandle
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
FreeLibrary
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
VirtualAlloc
HeapReAlloc
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ