Static task
static1
Behavioral task
behavioral1
Sample
39ebfb87a0b325975e5562f9d653ac37_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
39ebfb87a0b325975e5562f9d653ac37_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
39ebfb87a0b325975e5562f9d653ac37_JaffaCakes118
-
Size
196KB
-
MD5
39ebfb87a0b325975e5562f9d653ac37
-
SHA1
afc42cd2595c32380bcf7dac9765e1532d746885
-
SHA256
0126cc7c162fdcc6403827b69d4325a71db83793e507e5f10735f9b3d8be64fe
-
SHA512
ddab8ceeceb4c26da63e5c129676d859b16a29b6d318dd5cad057db823181ade9f8378868aa3c7a4f53e45f425980bcde81dc958ee9701befe4688adafc97e0b
-
SSDEEP
6144:gy2lraXK8AkoYwYhyJozoI8JYsMF4Egajx:gy4ra5pIJozoI4MF1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39ebfb87a0b325975e5562f9d653ac37_JaffaCakes118
Files
-
39ebfb87a0b325975e5562f9d653ac37_JaffaCakes118.exe windows:4 windows x86 arch:x86
b3c230fea38cc046996c7cdfafe6922e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
VirtualProtect
GetProcAddress
HeapCreate
HeapDestroy
HeapFree
HeapAlloc
RtlUnwind
CreateFileA
LoadLibraryA
GetCurrentProcess
CloseHandle
LCMapStringA
ExitProcess
user32
CharLowerBuffA
CreateWindowExA
CloseWindow
SetWindowLongA
wsprintfA
advapi32
RegEnumValueA
RegDeleteKeyA
RegQueryValueA
RegCloseKey
RegCreateKeyA
RegSetValueA
RegDeleteValueA
RegOpenKeyA
RegEnumKeyA
Sections
BitArts Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE