Static task
static1
Behavioral task
behavioral1
Sample
437ab3a790384cd4f122ae9dcc0ed245_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
437ab3a790384cd4f122ae9dcc0ed245_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
437ab3a790384cd4f122ae9dcc0ed245_JaffaCakes118
-
Size
88KB
-
MD5
437ab3a790384cd4f122ae9dcc0ed245
-
SHA1
3965f3311e56b97772e054bbe47b47dac293470a
-
SHA256
6cb1c041e4f12770cee3d8de9f0d9a7fcf7df8aab5968fd8e0826779faa3412c
-
SHA512
772dca903497b0c87e1654768f17574004707fe1ea573e1701247d527632e9ecf46588af52cb41aaedde0d05880cc0b10ea0df8cd5e0221b21093334cfd91b84
-
SSDEEP
1536:6klJht/fl7li+5Uwomo4nNBmRy3USEuDd/nW4SUIudg1cyoldwq3b7uVx:68JP/fmrwomVNoRjuDdnpSUfg1cyUl3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 437ab3a790384cd4f122ae9dcc0ed245_JaffaCakes118
Files
-
437ab3a790384cd4f122ae9dcc0ed245_JaffaCakes118.exe windows:4 windows x86 arch:x86
f433e7fcc51e68080022754836705744
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
VirtualAlloc
VirtualFree
user32
MessageBoxA
Sections
.packed Size: - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
v2mdwyeu Size: 46KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
iv5mt.1n Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdlojqul Size: - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
8ixwiape Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ehg3bq62 Size: 10KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE