Static task
static1
Behavioral task
behavioral1
Sample
29f7fbdbe7ab00a4dbc63e7c3c563e25_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
29f7fbdbe7ab00a4dbc63e7c3c563e25_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
29f7fbdbe7ab00a4dbc63e7c3c563e25_JaffaCakes118
-
Size
40KB
-
MD5
29f7fbdbe7ab00a4dbc63e7c3c563e25
-
SHA1
e1aa52f92fb330c2b05f8831729cfb57765ce66f
-
SHA256
8f7784c561a419265ac0aa860ae747bbc55f168d3c547f7c5f70feca2ac8aaa6
-
SHA512
aa8f999b9f2f54e90f55363d87f9bd7eb2a4dbeb9eee1a24f38d2809c8f456ac57511f321bb1414da0ae9bcd48419601b0f98e72d81ad9470023e7df6f35f18d
-
SSDEEP
768:LpU9veKA0ujoiDiiiNMXPgGRwB6Q3jq4kpD2I:LS9veKkoiPsJGGI4k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 29f7fbdbe7ab00a4dbc63e7c3c563e25_JaffaCakes118
Files
-
29f7fbdbe7ab00a4dbc63e7c3c563e25_JaffaCakes118.exe windows:4 windows x86 arch:x86
9db211ebb13b7cbb4a4e87df4d3ac59a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpA
GetModuleHandleA
GetCommandLineA
GetVersion
ExitProcess
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ