Static task
static1
Behavioral task
behavioral1
Sample
6196134ca4180425ae794de7a2108b8a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6196134ca4180425ae794de7a2108b8a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6196134ca4180425ae794de7a2108b8a_JaffaCakes118
-
Size
1.4MB
-
MD5
6196134ca4180425ae794de7a2108b8a
-
SHA1
ebd0a454e724d58a18a3724b7801badf6f504199
-
SHA256
c31ea0b31f2c15fcac3d52b822ceb1c33317f0157f6c0fc9429adc2ca7b41c29
-
SHA512
1b6e4221702f675216c61754fc5cef46b1df53c240af47e0234850b54e219d9b39b568af39d806968af5e90f0a287a8f89314780893c8928bfecfd2ee831cd5c
-
SSDEEP
24576:dsLV7uv/pa5TDdbQAcvjUA43gWwmfnyxM+5UT1GDNt20q0xKFj5ujLeI0ybyOULw:dsp7uXgnbQHUvwWwmvyx5UT1E/VmXg+A
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6196134ca4180425ae794de7a2108b8a_JaffaCakes118
Files
-
6196134ca4180425ae794de7a2108b8a_JaffaCakes118.exe windows:4 windows x86 arch:x86
ca1bdec99adcebfcf8492ab4320ebdea
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
VirtualProtect
GetProcAddress
HeapCreate
HeapDestroy
HeapFree
HeapAlloc
RtlUnwind
LCMapStringA
GetCurrentProcess
CloseHandle
ExitProcess
LoadLibraryA
CreateFileA
user32
CharLowerBuffA
CreateWindowExA
SetWindowLongA
CloseWindow
wsprintfA
advapi32
RegOpenKeyA
RegQueryValueA
RegCreateKeyA
RegEnumValueA
RegDeleteValueA
RegSetValueA
RegDeleteKeyA
RegEnumKeyA
RegCloseKey
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 88KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ