Static task
static1
Behavioral task
behavioral1
Sample
4d6e3c60bb19abca47ae3c1fd6a99f55_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4d6e3c60bb19abca47ae3c1fd6a99f55_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4d6e3c60bb19abca47ae3c1fd6a99f55_JaffaCakes118
-
Size
920KB
-
MD5
4d6e3c60bb19abca47ae3c1fd6a99f55
-
SHA1
863b5ab60262752c6ad2b0239566bb14e578eaff
-
SHA256
92b697bc048e793b920def05acaf4c469d05bafaeccdb3716261d9ea200c83a6
-
SHA512
a1fa98556ab938697aaaf0cf416a8c0c03bc7dab4b4a68d3e5aaabf37c7112f0bb2c2cb4a53e8cc2934c9f2fb8be983e915be4a89e8a1574273a0e9d5035bcc8
-
SSDEEP
6144:enelloSyTWu9W3EyPeGrud/eW4CcjZy+w3VpvqGmUY5YvhJXScD0DD90JlcKnrJE:tEJau9W3EA4/l4N8xftJJymekrJI7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d6e3c60bb19abca47ae3c1fd6a99f55_JaffaCakes118
Files
-
4d6e3c60bb19abca47ae3c1fd6a99f55_JaffaCakes118.exe windows:4 windows x86 arch:x86
0e71870a6507fb88fe9d74715644ce75
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
VirtualProtect
GetProcAddress
HeapCreate
HeapDestroy
HeapFree
HeapAlloc
RtlUnwind
LoadLibraryA
GetCurrentProcess
CreateFileA
CloseHandle
ExitProcess
LCMapStringA
user32
CreateWindowExA
wsprintfA
CloseWindow
SetWindowLongA
CharLowerBuffA
advapi32
RegDeleteKeyA
RegSetValueA
RegCreateKeyA
RegEnumValueA
RegDeleteValueA
RegCloseKey
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
Sections
.text Size: 900KB - Virtual size: 900KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 53B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ