Static task
static1
Behavioral task
behavioral1
Sample
61f417ccd939b2b66517afdaa526fd7b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
61f417ccd939b2b66517afdaa526fd7b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
61f417ccd939b2b66517afdaa526fd7b_JaffaCakes118
-
Size
282KB
-
MD5
61f417ccd939b2b66517afdaa526fd7b
-
SHA1
25746d054af86fd63d2a1a2f2d3f8f383c70b6c4
-
SHA256
ba8924a0b5237e4fee02d488bd4f5d9ac62e033c0381c5d22473b917be1911a6
-
SHA512
37cf2fce9f0770b3efda2f3a3a53ad2759f4a39bd8bd1f0576b9d909a5dc3b95ca8f286ac7a05d168b3a2c76632c13e8c08dc033cceb449249d621cda61c80b7
-
SSDEEP
6144:wjqf/4I0RCnneKMGGq7T+hqZZYsJn2djNl:Jf/Bnn4cyhe3JnEhl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 61f417ccd939b2b66517afdaa526fd7b_JaffaCakes118
Files
-
61f417ccd939b2b66517afdaa526fd7b_JaffaCakes118.exe windows:4 windows x86 arch:x86
32ca8d5fca836efa8536566f0eee05c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetProcAddress
GetModuleHandleA
LoadLibraryA
ExitProcess
CreateThread
VirtualAlloc
VirtualFree
ExitThread
GetSystemDirectoryA
CreateFileA
WriteFile
CloseHandle
FreeLibrary
GetFileTime
CompareFileTime
GetModuleFileNameA
GetCommandLineA
Sections
BitArts Size: 171KB - Virtual size: 597KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 68KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE