Static task
static1
Behavioral task
behavioral1
Sample
159e9477ae111d45ddbf4dbffb166b97_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
159e9477ae111d45ddbf4dbffb166b97_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
159e9477ae111d45ddbf4dbffb166b97_JaffaCakes118
-
Size
1.2MB
-
MD5
159e9477ae111d45ddbf4dbffb166b97
-
SHA1
07043d665f20118a69eef8346b1b17d4aaaf55b1
-
SHA256
b2fc60ab0db12e0a0222502f5d792c001863de4a7edea78303a5179f89c71919
-
SHA512
889adecfe44b5bed6f7f04079b5fcb887c445db005c3dd3482e6e4b09dc2ed53e9680cec94bc18d0d588845fef53be82051ff84f0b1212bf416ba032b47157d7
-
SSDEEP
24576:u4YE7UBt2763yNrAu4Nfxc+h49nnTs8pDvnQLBz93LuofyNci:i6763yNrYNZcP9noW7nQFli7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 159e9477ae111d45ddbf4dbffb166b97_JaffaCakes118
Files
-
159e9477ae111d45ddbf4dbffb166b97_JaffaCakes118.exe windows:4 windows x86 arch:x86
f433e7fcc51e68080022754836705744
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
VirtualAlloc
VirtualFree
user32
MessageBoxA
Sections
.text Size: - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mc4n66cn Size: - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
7kkd2di4 Size: - Virtual size: 524KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zq37l54n Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
u338wt4a Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ