Static task
static1
Behavioral task
behavioral1
Sample
6622ff470586d0e46349ebf04841de37_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6622ff470586d0e46349ebf04841de37_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
6622ff470586d0e46349ebf04841de37_JaffaCakes118
-
Size
16KB
-
MD5
6622ff470586d0e46349ebf04841de37
-
SHA1
bd61e764196523413e5d9129d5ffb40281fc1b0f
-
SHA256
02972bffbc86e03d38681a5035a6820a4407d3d2009978b53efb98af3056a0f4
-
SHA512
3362a9d1cb04bedef3f4ea2849e839ee4ede3fc72f265b685268d2629cbbfea0869d853a328bc1721110577e4f87d8aaaf239557df194a357bd6b6882545a1ee
-
SSDEEP
192:omVZTOajrR7u6rQXtyI6BYECsW0K8s2AmU+wuqb:ombTOajrRxoy/G
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6622ff470586d0e46349ebf04841de37_JaffaCakes118
Files
-
6622ff470586d0e46349ebf04841de37_JaffaCakes118.exe windows:4 windows x86 arch:x86
780aff5ba8cec24ce067340e079374a1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetSystemDirectoryA
Sleep
GetProcAddress
LoadLibraryA
CloseHandle
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
GetModuleHandleA
OpenProcess
WinExec
GetWindowsDirectoryA
user32
FindWindowA
GetWindowThreadProcessId
Sections
.text Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 486B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE