Static task
static1
Behavioral task
behavioral1
Sample
465a63e0c8452eb4c420edac4292eff2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
465a63e0c8452eb4c420edac4292eff2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
465a63e0c8452eb4c420edac4292eff2_JaffaCakes118
-
Size
106KB
-
MD5
465a63e0c8452eb4c420edac4292eff2
-
SHA1
c15958ca1b8608e7a386716a76ffec00b166ac02
-
SHA256
9cd16562126fcd0a948c8f7e9f155c18c4a5fc819d2c34c2827d678753dbd4f6
-
SHA512
c731deb27709d6c9afde8f145f999a1ca576d9bc7fffeca42741c5cf48932daa317e8649cae41d48ad103a81aaaec57e36d3ab02d15ec6ce42e1b245d5664ca9
-
SSDEEP
3072:f4lrvAQHB7DpdZRvR8MDpKtyVYMnfmqu:4HlDpdZRZ8KznO3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 465a63e0c8452eb4c420edac4292eff2_JaffaCakes118
Files
-
465a63e0c8452eb4c420edac4292eff2_JaffaCakes118.exe windows:4 windows x86 arch:x86
4406c5f79b8a3d5365c4c472121dd565
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentDirectoryA
GetCurrentProcessId
GetProcAddress
LoadLibraryA
GetWindowsDirectoryA
GetVersionExA
CreateMutexA
VirtualProtect
GetComputerNameA
LockResource
GetCurrentProcess
LoadResource
FindResourceA
LocalFree
CreateEventA
ExitProcess
GetCurrentThread
VirtualAlloc
GetStdHandle
LocalAlloc
GetSystemDirectoryA
GetCurrentThreadId
advapi32
GetUserNameA
user32
GetForegroundWindow
GetSystemMetrics
GetActiveWindow
msvcrt
memcpy
memset
wcslen
wcsncpy
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 14B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE