Static task
static1
Behavioral task
behavioral1
Sample
7636b3f3d260187259bcaffcafeec3d8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7636b3f3d260187259bcaffcafeec3d8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7636b3f3d260187259bcaffcafeec3d8_JaffaCakes118
-
Size
4KB
-
MD5
7636b3f3d260187259bcaffcafeec3d8
-
SHA1
ea17ca3b6c4b4ae7ef5a037a805f165f60e8b356
-
SHA256
eb73a8080e258a8253e4a13d10c83c65e1757fa747933861173ff43241314c49
-
SHA512
9175696cbc82f0c7023d92db86c30ccbf777fc82ec697073fd79c7cbe42e6e8c7f06b5aafc1b7e0437c2dffafe3be7d8462e3be6333543fc002fa0ac75415f50
-
SSDEEP
48:iWHbCqWsMMnCZghdW9HgYl8vJCMMUMM9YMHNcI6wsMMPch40JMMp1TllMMNMR/Db:BWiPdl6zoBtTl33c771
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7636b3f3d260187259bcaffcafeec3d8_JaffaCakes118
Files
-
7636b3f3d260187259bcaffcafeec3d8_JaffaCakes118.exe windows:5 windows x86 arch:x86
e4f0dc4743aec0a08615e627b06adaec
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwDeviceIoControlFile
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
wcscat
RtlFreeAnsiString
RtlFreeUnicodeString
wcscpy
RtlAnsiStringToUnicodeString
RtlUnicodeStringToAnsiString
IofCompleteRequest
KeServiceDescriptorTable
IoCreateSymbolicLink
IoCreateDevice
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 640B - Virtual size: 560B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 424B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 256B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ