Static task
static1
Behavioral task
behavioral1
Sample
422b9562c46cc0935028d229871e98c7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
422b9562c46cc0935028d229871e98c7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
422b9562c46cc0935028d229871e98c7_JaffaCakes118
-
Size
44KB
-
MD5
422b9562c46cc0935028d229871e98c7
-
SHA1
e801c0340a583abf1b076f0100c0c135f0cc994e
-
SHA256
1e4f41c4da19be4d6bc55ecf8882fc8c231316c61d7f05953c27ff4c70ed4394
-
SHA512
d01afef70cece2f3e897dc21361f12bd6c52c287e7ed76e25ac3cef3328af588a01cb8c053edcf4abe7d74d97c56e049dd87c4730b855c684aa9421fb0987ac7
-
SSDEEP
768:aYpxHy5bOuh6oU1VLUsPMDf3uTWMTMM8ZEvc:aYpxS5a5oI+6MDWTW8B8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 422b9562c46cc0935028d229871e98c7_JaffaCakes118
Files
-
422b9562c46cc0935028d229871e98c7_JaffaCakes118.exe windows:4 windows x86 arch:x86
fcc09da703b6e4bc0c83783998aeed6f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PostMessageA
FindWindowA
kernel32
HeapDestroy
HeapCreate
GetStringTypeW
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStringTypeA
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
Sections
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE