Static task
static1
Behavioral task
behavioral1
Sample
6133a527f7cc4ae8f7214277472f018c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6133a527f7cc4ae8f7214277472f018c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6133a527f7cc4ae8f7214277472f018c_JaffaCakes118
-
Size
164KB
-
MD5
6133a527f7cc4ae8f7214277472f018c
-
SHA1
de06eeac6a5f2b3c9c441132b0554e09725f78e0
-
SHA256
57d8780dc3170feedc6d35a6bbaba035891028aeaeb6df9d1229f9209534424f
-
SHA512
2cc4c123e0959ce5d298af4b1f35fb0b44c9dc69157b735a082591078c977d46da48c5a07134d1906535e7d5c756a83c871abbae31a0d95e858c845e0a1dabd3
-
SSDEEP
3072:yxVDM8zut/AAAAApjfHrhSlbbXbjtRmgZtNciKWgZbabnKnFONcCP27m6802:kEAAAAAZ9eb1IiciKlWavGp6802
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6133a527f7cc4ae8f7214277472f018c_JaffaCakes118
Files
-
6133a527f7cc4ae8f7214277472f018c_JaffaCakes118.exe windows:4 windows x86 arch:x86
f433e7fcc51e68080022754836705744
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
VirtualAlloc
VirtualFree
user32
MessageBoxA
Sections
.text Size: - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
up4p1ezb Size: - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
8xcaxtww Size: 135KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
6wqb3nlz Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ