Static task
static1
Behavioral task
behavioral1
Sample
427902be251eab2373852351748664b0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
427902be251eab2373852351748664b0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
427902be251eab2373852351748664b0_JaffaCakes118
-
Size
128KB
-
MD5
427902be251eab2373852351748664b0
-
SHA1
e92d7a98db7c8943747243a4fbe53ceaac9700f5
-
SHA256
7a503ed720bd31a9897843b46820a9b331711a5c3784822f18cc1b0899344c29
-
SHA512
5b9167016eeb0a9168e14a65420ba672523d36f13ddc2f09229ade0b429c56f6db3c4171b63d364bcb7c62566f3fc9945ec83fc7c9e8f0723be12b9b2fe60b60
-
SSDEEP
1536:sndcJ/b4Zs8aJRxqwHS+YQoWpXI4WDnF:sFy8aJ1gxWpYtn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 427902be251eab2373852351748664b0_JaffaCakes118
Files
-
427902be251eab2373852351748664b0_JaffaCakes118.exe windows:4 windows x86 arch:x86
8224a5dcb45410abe7c9b4b4486398c4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
GetProcAddress
LoadLibraryA
VirtualProtect
GetCurrentProcessId
LockResource
CreateFileA
LoadResource
FindResourceA
VirtualAlloc
VirtualFree
HeapFree
GetProcessHeap
VirtualProtectEx
VirtualAllocEx
GetCurrentProcess
ExitProcess
SetEvent
GetModuleHandleA
ExitThread
HeapAlloc
InterlockedExchange
RtlUnwind
VirtualQuery
ole32
CoCreateInstance
Sections
.text Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ