Static task
static1
Behavioral task
behavioral1
Sample
687d15f9479d501144ce1d98d241dcc1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
687d15f9479d501144ce1d98d241dcc1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
687d15f9479d501144ce1d98d241dcc1_JaffaCakes118
-
Size
135KB
-
MD5
687d15f9479d501144ce1d98d241dcc1
-
SHA1
b4de4a3798da9bc2a0bf9b4d50c7d4e3d886e32c
-
SHA256
ab907e52f8abd36d08faebe2199c2a5721ff38b94a0fbdf6330eb2190c383988
-
SHA512
e516fe559254570d15ad89b57185516b88570f5ebd744e350fc0eb283eef236004c9230ff6a62b4b9e35a60f09bbc42b39865df28713c55e54ec14e4240d4dd8
-
SSDEEP
1536:M2tu4G8hzBBul6Lh/XMN5FlfM3XBK5JIYqGar+AT6YCwth4Ns+BHJl0ApF/+w97C:M2tu419So/8nkHQ03rL6imL44XsNWu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 687d15f9479d501144ce1d98d241dcc1_JaffaCakes118
Files
-
687d15f9479d501144ce1d98d241dcc1_JaffaCakes118.exe windows:4 windows x86 arch:x86
b90c291c5596cbf2f64c2d50268b794c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
ExitProcess
ResumeThread
GetCommandLineA
VirtualLock
GetModuleHandleA
CreateEventA
GetProcAddress
VirtualAlloc
Sleep
ResetEvent
user32
GetParent
LoadIconA
LoadCursorA
advapi32
CryptAcquireContextA
CryptGenKey
ole32
CoUninitialize
avifil32
AVIStreamBeginStreaming
AVIBuildFilterA
msvfw32
DrawDibSetPalette
DrawDibBegin
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 776B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 534KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 192KB - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ