Static task
static1
Behavioral task
behavioral1
Sample
a20a115fb673787ad08ef4a1907ad8ff_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a20a115fb673787ad08ef4a1907ad8ff_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a20a115fb673787ad08ef4a1907ad8ff_JaffaCakes118
-
Size
187KB
-
MD5
a20a115fb673787ad08ef4a1907ad8ff
-
SHA1
417b4321eb5d30d982ba535ebf56c087e85e2923
-
SHA256
c65d6024e7070eb07d08e004f41550780f1bad4f44401d0136f5cf1d956dab6c
-
SHA512
4c392ca60abb7d097e61c9dd8cc5732de404bb0b12a21fcab7be826a43bd8aba1ffcb12d200c90a3e077df6ac2543ea44ce597fca69cd6d3bc69c845f8c3921a
-
SSDEEP
3072:KJAGE1kwxDX4yt4I4z5LOwACQbqbz3WJLL3Am1Ci0+UTIgjhxyiH6pHP1vCS7NSn:OQHD0wzC3bTWRblPUTFdxyia1P1vCSZe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a20a115fb673787ad08ef4a1907ad8ff_JaffaCakes118
Files
-
a20a115fb673787ad08ef4a1907ad8ff_JaffaCakes118.exe windows:4 windows x86 arch:x86
f433e7fcc51e68080022754836705744
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
VirtualAlloc
VirtualFree
user32
MessageBoxA
Sections
.text Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
0qemay0e Size: - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gmjvhr98 Size: - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.a1oosgz Size: 165KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
f1.244ve Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ