Static task
static1
Behavioral task
behavioral1
Sample
4232ff7763a5f310180007583ad4ee87_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4232ff7763a5f310180007583ad4ee87_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4232ff7763a5f310180007583ad4ee87_JaffaCakes118
-
Size
53KB
-
MD5
4232ff7763a5f310180007583ad4ee87
-
SHA1
ba2837c55a6ab31985443966406077393d51d068
-
SHA256
04b0a291763411547ec036b5f165f00efb839e9a58722fd06ad3e304e4b0a580
-
SHA512
fc16c519e97a9ed3022c6538d27e41a7503eeb884789622e358cd96dda8fa6aff4cc7c93a321eb80c1bb280baeddca1631f754ddf28610b52a720528e1204bb9
-
SSDEEP
768:yrXRlp0fWoIqFFUV6fQUuw0BKsH7rjFA:cd0kZVS0Yi7rjFA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4232ff7763a5f310180007583ad4ee87_JaffaCakes118
Files
-
4232ff7763a5f310180007583ad4ee87_JaffaCakes118.exe windows:5 windows x86 arch:x86
882a93eaa965165392b7c99c7b8d148d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryW
LoadLibraryA
GetModuleHandleW
GetModuleHandleA
CreateFileW
lstrcatW
GetWindowsDirectoryW
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 484B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dd Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dd1 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dd2 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ