Static task
static1
Behavioral task
behavioral1
Sample
636fc8996f7a46426872fba94d4b8041_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
636fc8996f7a46426872fba94d4b8041_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
636fc8996f7a46426872fba94d4b8041_JaffaCakes118
-
Size
222KB
-
MD5
636fc8996f7a46426872fba94d4b8041
-
SHA1
72d39664b76dac5c9d1ae8632a13709133030418
-
SHA256
434c8a3d6a352659caefb2211fa2126de9acbb52619a9981256e513f1ebb0137
-
SHA512
73f4de9d8370979c207ca9c9d04693a043e1b33449b2c44a39f6969dc07ea3146523752888eb09911f9d3a98e186e30f3d037aa91d145f586f89c746892dabdf
-
SSDEEP
6144:ljjMq3TR7oOMk0y43+u2W2HwZXwgtnkXn+:l/B7oOMJyqYiAX+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 636fc8996f7a46426872fba94d4b8041_JaffaCakes118
Files
-
636fc8996f7a46426872fba94d4b8041_JaffaCakes118.exe windows:4 windows x86 arch:x86
32ca8d5fca836efa8536566f0eee05c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetProcAddress
GetModuleHandleA
LoadLibraryA
ExitProcess
CreateThread
VirtualAlloc
VirtualFree
ExitThread
GetSystemDirectoryA
CreateFileA
WriteFile
CloseHandle
FreeLibrary
GetFileTime
CompareFileTime
GetModuleFileNameA
GetCommandLineA
Sections
BitArts Size: 102KB - Virtual size: 308KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: - Virtual size: 5KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 68KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE