Static task
static1
Behavioral task
behavioral1
Sample
713b01268f6f71bc47efd14c55fb1c62_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
713b01268f6f71bc47efd14c55fb1c62_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
713b01268f6f71bc47efd14c55fb1c62_JaffaCakes118
-
Size
122KB
-
MD5
713b01268f6f71bc47efd14c55fb1c62
-
SHA1
9b72213390d32529d04965e298200919ab23eac2
-
SHA256
ebf9e9cd4054576e48894389637b67c84c0cb5055a8bf383f08296c6b3af4c83
-
SHA512
35381446b05f08df4fe0d3787f5c8190075ffda3f69ff59bc5962cc3a1ad23fa5a6d303c355be6f087d7136a8d9d72c5dc135c7b262bc0ccddf87704737630e4
-
SSDEEP
1536:RK9CP2KsjKM0MD3MWCc2nyB2QVgd54vwL:II2vOc2nyB2L7jL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 713b01268f6f71bc47efd14c55fb1c62_JaffaCakes118
Files
-
713b01268f6f71bc47efd14c55fb1c62_JaffaCakes118.exe windows:5 windows x86 arch:x86
faee01137734e27675d0a3ca2ffa9f5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleFileNameExA
kernel32
VirtualAlloc
CreateFileA
ExitProcess
GetProcAddress
GetModuleHandleA
GetCurrentProcess
GetLastError
FindResourceExA
LockResource
LoadResource
FindResourceA
WaitForSingleObject
CreateThread
SetLastError
LoadLibraryA
IsBadReadPtr
VirtualProtect
HeapAlloc
HeapFree
CloseHandle
ReadFile
SetFilePointer
GetStartupInfoA
GetCommandLineA
GetProcessHeap
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 854B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 110KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 582B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ