Static task
static1
Behavioral task
behavioral1
Sample
725e8efa96b5a466d256e7194d1e15e0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
725e8efa96b5a466d256e7194d1e15e0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
725e8efa96b5a466d256e7194d1e15e0_JaffaCakes118
-
Size
228KB
-
MD5
725e8efa96b5a466d256e7194d1e15e0
-
SHA1
62a8d97547177267029d5766ea55534caed2a4b2
-
SHA256
bcdfa466c5d39a683b44f9f9f8a46abbb44fae4a4cb286eca59e9ce405c52399
-
SHA512
4fe2ac4433c3ff7ef8438e614251096bb86360b5af16ff0314f9f4d6dcbce964a045748aa19bf1dc8c73cb16361288f4bb47c27b2dd11ea0432e28063b31fec5
-
SSDEEP
6144:Rxfvg4C28ZP/+wlQuabYnzUQkudfrk6pMH:XmPWCVNzrkB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 725e8efa96b5a466d256e7194d1e15e0_JaffaCakes118
Files
-
725e8efa96b5a466d256e7194d1e15e0_JaffaCakes118.exe windows:5 windows x86 arch:x86
e9a3c50dec7ad04acc58afdd4c752832
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
RaiseException
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
HeapSize
GetCurrentProcess
GetModuleFileNameA
GetVersionExA
TerminateProcess
TlsGetValue
TlsSetValue
GetLocaleInfoA
GetACP
InterlockedDecrement
GetSystemInfo
SetEndOfFile
LZDone
TlsFree
SetLastError
TlsAlloc
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
VirtualQuery
RtlUnwind
ExitProcess
user32
wsprintfA
ReleaseCapture
PostMessageA
GetWindowPlacement
SendMessageA
LoadCursorA
SetCursor
odbc32
SQLGetTypeInfoA
Sections
.text Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 638KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ