Static task
static1
Behavioral task
behavioral1
Sample
14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
14e9af2b3b387642887c9e545ac248d2_JaffaCakes118
-
Size
240KB
-
MD5
14e9af2b3b387642887c9e545ac248d2
-
SHA1
0d25004347da456697ef8c4ddbf8e8ecdc606972
-
SHA256
495ae62a0acba8cd23585cf6bbb8e35ca2944c9028816ec66ffe7248f63455e6
-
SHA512
590c3b34ff4e7536e673700f4e0b2fdde96a97b0c6f36e0a6387bb24806f16def37625bf62213fd348a14237984193b6b65ba9b9eb0194f0e39df8d65e1be32b
-
SSDEEP
6144:m8g/7ixgAHtuypsUb+MlLwIPXD5OkkQ4tMZqdQsyBd+ptEs:mzeWildh1wIPXD5OkkQ4uqdQD6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118
Files
-
14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe windows:5 windows x86 arch:x86
9e8fb2ba695c2b302f5078c72bc2f011
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
VirtualProtect
GetProcAddress
HeapCreate
HeapDestroy
HeapFree
HeapAlloc
RtlUnwind
ExitProcess
LCMapStringA
GetCurrentProcess
LoadLibraryA
CloseHandle
CreateFileA
user32
wsprintfA
CloseWindow
SetWindowLongA
CharLowerBuffA
CreateWindowExA
advapi32
RegSetValueA
RegEnumValueA
RegOpenKeyA
RegDeleteValueA
RegCreateKeyA
RegEnumKeyA
RegCloseKey
RegDeleteKeyA
RegQueryValueA
Sections
.text Size: 200KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 236KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ