Static task
static1
Behavioral task
behavioral1
Sample
9703e7540aad54ec89187428fa1a281f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9703e7540aad54ec89187428fa1a281f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9703e7540aad54ec89187428fa1a281f_JaffaCakes118
-
Size
84KB
-
MD5
9703e7540aad54ec89187428fa1a281f
-
SHA1
51f43e947e7efb1c85a744f3d5eb2192acfc26bb
-
SHA256
87d98c13e42cf5f7713e81ab48260dfa5ac6184fed763179dd530a86e16b8c17
-
SHA512
32ec6d09456132779071622938697a29679032d29fd2585bc7a94c7ca9f4f32bd6b23b4c73816a40abbd94a3d888817db15e31efc73853b6f320e4de08e7b03a
-
SSDEEP
768:5Ph7TzTBziifTeiZSVWihwEknh0L7OTLeNfQfNp6rLEFp6baIa0rJG7pRtLoI:VZ/nEkh8OTKNu8rwF8baIa0rJi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9703e7540aad54ec89187428fa1a281f_JaffaCakes118
Files
-
9703e7540aad54ec89187428fa1a281f_JaffaCakes118.exe windows:4 windows x86 arch:x86
8afbf9211984274dc7a21b630ecae242
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleA
GetTickCount
HeapAlloc
ExitProcess
GetStartupInfoA
GetCommandLineA
GetProcessHeap
user32
MessageBoxA
Sections
BitArts Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rs2c Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE