Static task
static1
Behavioral task
behavioral1
Sample
733167fd2aa88ceab746eb4dc80e35c8_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
733167fd2aa88ceab746eb4dc80e35c8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
733167fd2aa88ceab746eb4dc80e35c8_JaffaCakes118
-
Size
25KB
-
MD5
733167fd2aa88ceab746eb4dc80e35c8
-
SHA1
9504b8c3a549fd857a1a37aa5cedb6ff3880da0d
-
SHA256
0bcc28d33e870b02a5abca7879c4646e2176974f993a3aafd5870b0889b9314c
-
SHA512
3e65fea3ad2b1a5ceabbf00b38ea8fa83fcd377c6d048e77cff4194b1cc2c5aab5710186df978075c029d03812be3de6b7f1ca62f44343c577005c679facdbaf
-
SSDEEP
384:yHIYMLZn4TKWhq3zQPY+DYo1A3s8w9qFAW3l+mlFDmmUyFkrh6oZ:TYslahDsoCGqJDUsKh6o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 733167fd2aa88ceab746eb4dc80e35c8_JaffaCakes118
Files
-
733167fd2aa88ceab746eb4dc80e35c8_JaffaCakes118.exe windows:4 windows x86 arch:x86
812c27df5aa353fe5098542519bb9907
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ