Static task
static1
Behavioral task
behavioral1
Sample
4012de9c416c1a33dcb83966de4e88bf_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4012de9c416c1a33dcb83966de4e88bf_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4012de9c416c1a33dcb83966de4e88bf_JaffaCakes118
-
Size
87KB
-
MD5
4012de9c416c1a33dcb83966de4e88bf
-
SHA1
8772886ba98ab6a6ae4976acfd1f3d3c4f3c80ca
-
SHA256
8e67ae91cb9892d35533da32008dc8fe80c186a15e1527bea079249ba0801629
-
SHA512
622e61f14e0fbf2c82f2fdd3be3ebdefbdae9c51a2aef29ca92cecdf99e635458b585ec015250de17131c4f88c80f2c5bfbfe554db2e66dc64e5c9d20489dc98
-
SSDEEP
1536:EKIcHwYHffffEff/iJtZi4sZYTZW74eCkf+0K6bCTVICtffi8rHj48P:ErcQYHffffEffWDIYT6nCkfbdGTvtffd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4012de9c416c1a33dcb83966de4e88bf_JaffaCakes118
Files
-
4012de9c416c1a33dcb83966de4e88bf_JaffaCakes118.exe windows:4 windows x86 arch:x86
32ca8d5fca836efa8536566f0eee05c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleA
LoadLibraryA
ExitProcess
CreateThread
VirtualAlloc
VirtualFree
ExitThread
GetSystemDirectoryA
CreateFileA
WriteFile
CloseHandle
FreeLibrary
GetFileTime
CompareFileTime
GetModuleFileNameA
GetCommandLineA
Sections
BitArts Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
. Size: 39KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitAr Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE