Static task
static1
Behavioral task
behavioral1
Sample
5a03164b8138760dd83ffb41eb096059_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5a03164b8138760dd83ffb41eb096059_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5a03164b8138760dd83ffb41eb096059_JaffaCakes118
-
Size
28KB
-
MD5
5a03164b8138760dd83ffb41eb096059
-
SHA1
80fa1a2c61c1c749a08ad130140278204f6eee38
-
SHA256
8ee77e436f97c34dba36f022d9dc3945aaa79e81b5fe56677566d48b4fc4aeba
-
SHA512
ccf1259c46c03009b12f02ed30f8372b0fceb1b12c26b2555b1967a183749d3c3fd81b2326a2953041fe42b66e12bc4b710acb724a7f51bcecb89182e269cc3b
-
SSDEEP
384:G/Xb5KhVroEyRWuOHkydv4d6P1SCIcxA9Cm:gb5Uu4dAQd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5a03164b8138760dd83ffb41eb096059_JaffaCakes118
Files
-
5a03164b8138760dd83ffb41eb096059_JaffaCakes118.exe windows:4 windows x86 arch:x86
27994166666cfbbbd40367e9e095aafd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
OpenProcess
VirtualAllocEx
WriteProcessMemory
VirtualFreeEx
GetModuleHandleA
GetProcAddress
CreateRemoteThread
WaitForSingleObject
GetExitCodeThread
LoadLibraryExA
FreeLibrary
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
LCMapStringA
msvcrt
sprintf
atoi
_ftol
strncpy
??3@YAXPAX@Z
modf
free
malloc
memmove
user32
wsprintfA
MessageBoxA
Sections
.text Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 950B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE