Static task
static1
Behavioral task
behavioral1
Sample
771ad0524d53306b8f28b741400ed3e4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
771ad0524d53306b8f28b741400ed3e4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
771ad0524d53306b8f28b741400ed3e4_JaffaCakes118
-
Size
73KB
-
MD5
771ad0524d53306b8f28b741400ed3e4
-
SHA1
7801a7797664c28d1452f06768167578d39f4447
-
SHA256
362ead4f75d6e0fab97f7e9e7e23e1d9c170e8026473bb4aff03a4d813e64355
-
SHA512
2c647ac9ec9108ff501a358021d79f1f6d01e8a4044beb9549be9a0b01dcae960bd9123a43e74ca7173c606eebcbc4022c59ac984ddd601ca3453084ec96fc88
-
SSDEEP
1536:vO6pAvjiNTc2h+gqswN66gkp2radIlAfQHFfbyuQ9K1gi:G6Gf2QgSNHgkh1QlzKi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 771ad0524d53306b8f28b741400ed3e4_JaffaCakes118
Files
-
771ad0524d53306b8f28b741400ed3e4_JaffaCakes118.exe windows:5 windows x86 arch:x86
49f8f04159e5c4eda2e79c0494138d51
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
ZwUnmapViewOfSection
kernel32
VirtualAllocEx
lstrlenA
CloseHandle
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
ResumeThread
SetThreadContext
VirtualProtectEx
GetProcessHeap
ReadProcessMemory
GetThreadContext
CreateProcessA
GetProcAddress
LoadLibraryA
HeapAlloc
user32
wvsprintfA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.cc Size: 512B - Virtual size: 400B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 698B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 76B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sett Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ