Static task
static1
Behavioral task
behavioral1
Sample
8888cf41e547127b57fac2ad3d6c92f7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8888cf41e547127b57fac2ad3d6c92f7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8888cf41e547127b57fac2ad3d6c92f7_JaffaCakes118
-
Size
55KB
-
MD5
8888cf41e547127b57fac2ad3d6c92f7
-
SHA1
10b0c9c4397550009360201ed68c556e38271e3b
-
SHA256
494a724d9167e49938961ac2d19c53846eb9df66cf6b187685a98dd0f4c9eb17
-
SHA512
026eb9aac82d1ad51d689dec7c9cf1455e7c829e0c6a711e136e7a926cf5383b7c18d74112d24e9bacccb29d59a416c81bd6675b3b761f850eaf0b0b1dc194f4
-
SSDEEP
768:tIV120iLVHm8pskzU7cc+DYfUqyf0qcMyB65+Pa0fiKM/DYfUqyf0:e6xpw1f/00JB2Uaewkf/00
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8888cf41e547127b57fac2ad3d6c92f7_JaffaCakes118
Files
-
8888cf41e547127b57fac2ad3d6c92f7_JaffaCakes118.exe windows:4 windows x86 arch:x86
f6a68328381ddb1e52eb4df93358062e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
VirtualAlloc
ExitProcess
GetProcAddress
LoadLibraryExA
GetModuleHandleA
VirtualProtect
GetModuleFileNameA
FreeLibrary
GetLastError
CreateMutexA
LoadLibraryA
Sleep
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
wsprintfA
MessageBoxA
MessageBoxA
mfc42
ord823
msvcrt
printf
ws2_32
ntohs
mpr
WNetAddConnection2A
wininet
InternetOpenUrlA
Sections
.data Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ex_cod Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0987940 Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.0987941 Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE