Static task
static1
Behavioral task
behavioral1
Sample
37ed2aef2f4f08e36f4fb28168bbbe20_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
37ed2aef2f4f08e36f4fb28168bbbe20_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
37ed2aef2f4f08e36f4fb28168bbbe20_JaffaCakes118
-
Size
186KB
-
MD5
37ed2aef2f4f08e36f4fb28168bbbe20
-
SHA1
71d2c2567e736b1d6745c829f618a46773e720b3
-
SHA256
9d8832c98c4dc083a5522121b2e1e948b90b23197c6b01fc3cb312b61dc22162
-
SHA512
404c3cab7d9b5a2fc4143defd482c98bce140c042b2103b4ebdf752a3be24e577a5506f90e7b987296c7f0c204e00ad9db9770f5477860d9080f2913f06e6bdf
-
SSDEEP
3072:ZYRP8YOJR/TeshL5Hs2ACHiJDUnpKEdDXaNMXvfbTIZ0xvJan66rr8G:CRHOJR/TewBs2A8iinpNDXoM3Iy9MX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 37ed2aef2f4f08e36f4fb28168bbbe20_JaffaCakes118
Files
-
37ed2aef2f4f08e36f4fb28168bbbe20_JaffaCakes118.exe windows:4 windows x86 arch:x86
32ca8d5fca836efa8536566f0eee05c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetProcAddress
GetModuleHandleA
LoadLibraryA
ExitProcess
CreateThread
VirtualAlloc
VirtualFree
ExitThread
GetSystemDirectoryA
CreateFileA
WriteFile
CloseHandle
FreeLibrary
GetFileTime
CompareFileTime
GetModuleFileNameA
GetCommandLineA
Sections
BitArts Size: - Virtual size: 376KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 146KB - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE