Static task
static1
Behavioral task
behavioral1
Sample
5c022178ece8481bcbc5d463bb64cbfc_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5c022178ece8481bcbc5d463bb64cbfc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5c022178ece8481bcbc5d463bb64cbfc_JaffaCakes118
-
Size
73KB
-
MD5
5c022178ece8481bcbc5d463bb64cbfc
-
SHA1
28057bc2289fe897fc50c7df229a7f12feaf37bd
-
SHA256
fac919ea4471c94df88656007bf229baa8ba9dac5fc9d57d5c8280f0bb86e13c
-
SHA512
f520e2895836f935bb51d8412bf6f074a8771bcf1d26ed226ca8dc548ba98cd334a3743fbffd1eb5738d4a3659c288808ad8c2c71db628376ae00b8f28fd5892
-
SSDEEP
1536:u8j2m/qWuR1MOccuAoOJaRkHCuEbA1hqEY88zoe/lgCsflIZKd+:ujUtuRP5eaEbsEmOoOgCImKd+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5c022178ece8481bcbc5d463bb64cbfc_JaffaCakes118
Files
-
5c022178ece8481bcbc5d463bb64cbfc_JaffaCakes118.exe windows:4 windows x86 arch:x86
9c8decf3582072f6edfc385a689f44f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateDirectoryA
CreateFileA
DeleteFileA
ExitProcess
FreeLibrary
GetCommandLineA
GetFileTime
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
lstrcatA
lstrcmpiA
RemoveDirectoryA
SetFileTime
VirtualAlloc
VirtualFree
WriteFile
Sections
Size: - Virtual size: 56KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 31KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE