Static task
static1
Behavioral task
behavioral1
Sample
33c92bf811592c09cce5807e3842fe72_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
33c92bf811592c09cce5807e3842fe72_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
33c92bf811592c09cce5807e3842fe72_JaffaCakes118
-
Size
292KB
-
MD5
33c92bf811592c09cce5807e3842fe72
-
SHA1
6351f47dbe0ffed28e1f22dd92b6903e12cb417c
-
SHA256
d3003ec37dab95ed83654949e2eb2441ad2210b843a20d58b44b8114a8ec0249
-
SHA512
de7f653bfd5b8a3a141cc474344b9adb44e3b8a20d716846a7571bf5c3fdaa5e49ca9a5c80b8e2f9b11cacfed054e1d429b1675aad5500a89ab7b574f4af8e95
-
SSDEEP
6144:1EKduSp/kmVBZ4NrNFo0ONEQAmgGU5lK2Qmn1ByyicqXLV:15dN/hIlONEQAxGYc2vpcV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 33c92bf811592c09cce5807e3842fe72_JaffaCakes118
Files
-
33c92bf811592c09cce5807e3842fe72_JaffaCakes118.exe windows:4 windows x86 arch:x86
c30e69e0e1b4575278dd3fa467b7021f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strncmp
_strnicmp
user32
MessageBoxA
wsprintfA
kernel32
ResumeThread
HeapAlloc
IsBadReadPtr
HeapFree
GetModuleHandleA
GetModuleFileNameA
LocalSize
RtlMoveMemory
CreateProcessA
GetThreadContext
ReadProcessMemory
VirtualAllocEx
WriteProcessMemory
VirtualProtectEx
SetThreadContext
ExitProcess
WaitForSingleObject
CloseHandle
GetEnvironmentVariableA
TerminateProcess
lstrcpyn
GetProcessHeap
ntdll
ZwUnmapViewOfSection
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 858B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 264KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE