Static task
static1
Behavioral task
behavioral1
Sample
44a0085ad69f5767d0d37a547e9c82a2_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
44a0085ad69f5767d0d37a547e9c82a2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
44a0085ad69f5767d0d37a547e9c82a2_JaffaCakes118
-
Size
319KB
-
MD5
44a0085ad69f5767d0d37a547e9c82a2
-
SHA1
93a0569c0a923d6bddf7fe726a77762df2168c9b
-
SHA256
7fb7814a80f483a2f77319df7aa52af1c8481bfe3534d95837506e27d5bb10b1
-
SHA512
601c7f1dbf02d853c0234ea1d9843173c60accea9572d2ae48b0e512c8c6e4e816d0942127cc1d6783f4eca71d3c002e475e424fd259959d3abf79051be30f73
-
SSDEEP
6144:KSjpGXICDbg+45CtSm6XtL5YkyL0DQPWhEPBdNqAFsWmSSyMPdiqqD:KSUpp4ctSm6d9iL0DQPWhEPDwAFsZSDp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44a0085ad69f5767d0d37a547e9c82a2_JaffaCakes118
Files
-
44a0085ad69f5767d0d37a547e9c82a2_JaffaCakes118.exe windows:4 windows x86 arch:x86
f433e7fcc51e68080022754836705744
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
VirtualAlloc
VirtualFree
user32
MessageBoxA
Sections
.text Size: - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kuj6pfvq Size: - Virtual size: 276KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fv8licw5 Size: 310KB - Virtual size: 312KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
lt50v81b Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ