Static task
static1
Behavioral task
behavioral1
Sample
71b6a64105b85b3b1d6fb3b6256eb0a9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
71b6a64105b85b3b1d6fb3b6256eb0a9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
71b6a64105b85b3b1d6fb3b6256eb0a9_JaffaCakes118
-
Size
52KB
-
MD5
71b6a64105b85b3b1d6fb3b6256eb0a9
-
SHA1
b893e16839fb2cb94edd41247d0f602a2082ef5e
-
SHA256
a612b660c084c5d2aba0a5f91da2af8f5786b64dbc3b479bd2a888d75c067f7d
-
SHA512
501008344cbf9272d9c0c193ed0ac1eb8c3f51d2b0ffec184c15badb19020ccdbe6770187f94d06a25751b6e95f888c0613a2e980b30f9aa90cba608d4963cc7
-
SSDEEP
1536:qawekGIozatdrA0hlnvj8LLNXJsBClhyLcCC8O:fwekGIoAd00h9vj8LLNXwCX+I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 71b6a64105b85b3b1d6fb3b6256eb0a9_JaffaCakes118
Files
-
71b6a64105b85b3b1d6fb3b6256eb0a9_JaffaCakes118.exe windows:4 windows x86 arch:x86
17ac1c8a533312daecee1a18a5ec137a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
InterlockedExchange
Sleep
InterlockedCompareExchange
HeapFree
RtlUnwind
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
HeapAlloc
SetLastError
UnmapViewOfFile
SetFileTime
GetFileSize
GetFileTime
CloseHandle
CreateFileA
MapViewOfFile
CreateFileMappingA
SetEndOfFile
SetFilePointer
HeapDestroy
SetErrorMode
LoadLibraryA
GetModuleFileNameA
GetProcAddress
DeleteFileA
GetLastError
ExitThread
GetProcessHeap
EnumDateFormatsExA
ReplaceFileW
Sections
.code_01 Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ