Static task
static1
Behavioral task
behavioral1
Sample
35dec6ed28727cf4780771c71eb22359_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
35dec6ed28727cf4780771c71eb22359_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
35dec6ed28727cf4780771c71eb22359_JaffaCakes118
-
Size
69KB
-
MD5
35dec6ed28727cf4780771c71eb22359
-
SHA1
8472b7a1bff24d883fcb68837b555db82aa02bbe
-
SHA256
094fd7cc418c42a26599e042d96ebf9e5accf870e2860f5a54887668486432bb
-
SHA512
af61c5ff6d4c84c21447ab2c74ae2a2ca86295bf808dbba5a1c8f97b4f75e783cd364dc3e59f0ff9f5aba84608f69f1667799936121ebcb04c1ca16b4d5fac63
-
SSDEEP
1536:aY2zrVO0kexzty8tQ2UfJem+W53iE+Hed9H0l1m9yFh4H:afo0kexzs8t8oY4+d9Hc1Gy3c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 35dec6ed28727cf4780771c71eb22359_JaffaCakes118
Files
-
35dec6ed28727cf4780771c71eb22359_JaffaCakes118.exe windows:3 windows x86 arch:x86
bd9fd178f9f25f2d096853c49ab70cfe
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateFileA
CreateThread
DeleteCriticalSection
DisableThreadLibraryCalls
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetTickCount
HeapAlloc
HeapDestroy
InterlockedExchange
InterlockedIncrement
LoadLibraryA
LocalAlloc
LocalFree
MultiByteToWideChar
UnhandledExceptionFilter
VirtualAlloc
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ