Static task
static1
Behavioral task
behavioral1
Sample
17f6f109c2d4d65e1b988fe5dc7d63b0_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
17f6f109c2d4d65e1b988fe5dc7d63b0_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
17f6f109c2d4d65e1b988fe5dc7d63b0_JaffaCakes118
-
Size
35KB
-
MD5
17f6f109c2d4d65e1b988fe5dc7d63b0
-
SHA1
9a81d2816b284662805666b346d346472b0e8d7b
-
SHA256
6136520cc4b2386dc9818af50bf603029fbccbc4983ae3b2102d1d0f12603662
-
SHA512
96425208507365c45e5c855ae1e90e0840022b432d6f7354c47232c48f7c72e5adcb07fd8e6d5e0e44cb6439cad09c988ad76ca67057ca1026faaf8d69d8973b
-
SSDEEP
384:W9j24m71h9TeTutN2r1/sk4Be+dZJS7gojAkP7p64VW8/tUg:hdRd40kePS7gojbP7pzVle
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17f6f109c2d4d65e1b988fe5dc7d63b0_JaffaCakes118
Files
-
17f6f109c2d4d65e1b988fe5dc7d63b0_JaffaCakes118.exe windows:4 windows x86 arch:x86
0e144b8f2e25980362da92d1f270e9e5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
pbvm70
ord137
kernel32
GetOEMCP
GetACP
GetCommandLineA
GetModuleHandleA
GetStartupInfoA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WideCharToMultiByte
GetCPInfo
LoadLibraryA
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
WriteFile
HeapFree
HeapAlloc
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
VirtualAlloc
GetProcAddress
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ