Static task
static1
Behavioral task
behavioral1
Sample
86d228bf3293caf2ca324895d69df64d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
86d228bf3293caf2ca324895d69df64d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
86d228bf3293caf2ca324895d69df64d_JaffaCakes118
-
Size
52KB
-
MD5
86d228bf3293caf2ca324895d69df64d
-
SHA1
070a8368a97202b9b2f0c97e0b5c34f4882e083a
-
SHA256
7d6171244b97efd36170d0cc733a0436d32846567130459b3b3f144fcdcf38f0
-
SHA512
ef616872ccfdfb3bf0df257f07023dc9f7de67377c4a5cde4214e630bc35b664e7fb9433542e6386e8e59a80c8616dc3cac6573dcf13d9e93c4a314133ce18dd
-
SSDEEP
768:m4eyGOb+/oZWOFg5ze0mJp67RM+ULDduf7WMb8Yh:m4eyGboZT4ePwLvjtb8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 86d228bf3293caf2ca324895d69df64d_JaffaCakes118
Files
-
86d228bf3293caf2ca324895d69df64d_JaffaCakes118.exe windows:4 windows x86 arch:x86
ceaf3fc6ded5d9d8f654cb631cc29f46
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
ExitProcess
TerminateProcess
LoadLibraryA
RtlUnwind
GetCommandLineA
GetVersion
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ