Static task
static1
Behavioral task
behavioral1
Sample
454e916560f36a357dedb46dbe91f2a7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
454e916560f36a357dedb46dbe91f2a7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
454e916560f36a357dedb46dbe91f2a7_JaffaCakes118
-
Size
323KB
-
MD5
454e916560f36a357dedb46dbe91f2a7
-
SHA1
cd227fe7925c3e2e21f6f667346664fa044e148f
-
SHA256
c00881ca03ea79f67e0cb39b6df942a18f3255be73692543d55614529fba0251
-
SHA512
1d6cf2bd9c9156b6049054c98d2a8eca6f4d543c5ba8c2beb2e55cb1ca26fb83eca8c3f064fdd49e8d76f797cfd5f53793c52afbc09d0e7530ed7ec96fed0990
-
SSDEEP
6144:9MbJerw77BtplM89zbAVsBWWohbmucT+si+nGE5stkKq54xga3P9:9IJeoVLhbmNup+p+GESK41
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 454e916560f36a357dedb46dbe91f2a7_JaffaCakes118
Files
-
454e916560f36a357dedb46dbe91f2a7_JaffaCakes118.exe windows:4 windows x86 arch:x86
1966c10fa1ffb21e0aa9f6027d0229f2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetProcAddress
LockResource
GetModuleHandleA
VirtualFree
LoadLibraryA
LoadLibraryExW
FreeLibrary
CreateFileA
GetTempFileNameA
GetTempPathA
WriteFile
CloseHandle
GetTickCount
LoadResource
SizeofResource
FindResourceA
ExitProcess
MoveFileExW
MoveFileA
GetCommandLineW
user32
BeginPaint
EndPaint
PostMessageA
SetTimer
PostQuitMessage
DefWindowProcA
RegisterClassExA
LoadStringA
DispatchMessageA
TranslateMessage
GetMessageA
UpdateWindow
CreateWindowExA
ShowWindow
shell32
CommandLineToArgvW
SHGetFolderPathA
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 278KB - Virtual size: 277KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ