Static task
static1
Behavioral task
behavioral1
Sample
482a0b1da9a19b0445415d68d50688c5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
482a0b1da9a19b0445415d68d50688c5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
482a0b1da9a19b0445415d68d50688c5_JaffaCakes118
-
Size
148KB
-
MD5
482a0b1da9a19b0445415d68d50688c5
-
SHA1
f05fa385af282e154feea274a8dda41f7c903f8e
-
SHA256
ef0ecc5f402b887b6006992b5c85331cc315762a254e70a8a1725b55dde8b4d3
-
SHA512
e43bfe725e452fb46f10017a17e89d202ff652133b5d629f70a1b3ce508ebece153b95fc3c26f354077f50169204284ecd7395fd7a59a9c3122313d0546dcd88
-
SSDEEP
3072:F0A3Yclc3TuXbBByMgJYHOu1RjAX7jraXPXqPCqcEkqN5adXDULZ6:F0AcwryMgJQFbjAXuXPXqq5sAtDS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 482a0b1da9a19b0445415d68d50688c5_JaffaCakes118
Files
-
482a0b1da9a19b0445415d68d50688c5_JaffaCakes118.exe windows:4 windows x86 arch:x86
d809ff7d161b0f655a316de105459ecb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
LocalAlloc
GetCurrentDirectoryA
GetFileAttributesA
GetProcAddress
LoadLibraryA
GetTickCount
GetStringTypeA
LCMapStringW
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapAlloc
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
HeapReAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringA
GetStringTypeW
oleaut32
SafeArrayLock
Sections
.data Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ