Static task
static1
Behavioral task
behavioral1
Sample
49f97efbc613318b68eb3c6c6fb6bcfb_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
49f97efbc613318b68eb3c6c6fb6bcfb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
49f97efbc613318b68eb3c6c6fb6bcfb_JaffaCakes118
-
Size
300KB
-
MD5
49f97efbc613318b68eb3c6c6fb6bcfb
-
SHA1
e6993d7556332f28d1762e4768659b40519b3dbe
-
SHA256
c1904453718ff2b3e8ae6301d41d6f3a44b4b810d85bec7aa6329d4c805cc683
-
SHA512
9148d455384d09f0e31f00107452c6f7cfa6854ac97f12235e55367ce1bd32b50bc39f890226e0e33a9afcb4b53a9e23eb4937614a15370753ea63316c4b321b
-
SSDEEP
6144:RAd1gUtaNkvdn/pY9JbAtiz4DQFlZV2iqE11XvWEANWk:6aNkp/pY3bAtiMMFF2HE1vLk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 49f97efbc613318b68eb3c6c6fb6bcfb_JaffaCakes118
Files
-
49f97efbc613318b68eb3c6c6fb6bcfb_JaffaCakes118.exe windows:4 windows x86 arch:x86
776cbccec7debb7247d4076533a83a3f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
VirtualProtect
GetProcAddress
HeapCreate
HeapDestroy
HeapFree
HeapAlloc
RtlUnwind
LCMapStringA
LoadLibraryA
CreateFileA
ExitProcess
CloseHandle
GetCurrentProcess
user32
CharLowerBuffA
SetWindowLongA
CreateWindowExA
CloseWindow
wsprintfA
advapi32
RegDeleteKeyA
RegCloseKey
RegQueryValueA
RegCreateKeyA
RegEnumKeyA
RegEnumValueA
RegSetValueA
RegOpenKeyA
RegDeleteValueA
Sections
.text Size: 262KB - Virtual size: 264KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ