Static task
static1
Behavioral task
behavioral1
Sample
a37774bfbd638f9d19f2544e8be4ae77_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a37774bfbd638f9d19f2544e8be4ae77_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a37774bfbd638f9d19f2544e8be4ae77_JaffaCakes118
-
Size
244KB
-
MD5
a37774bfbd638f9d19f2544e8be4ae77
-
SHA1
2e96811a67427af696a24c3a0ed12971feafab0a
-
SHA256
9c84ed7c367aade390fea06b49091889380c1e4eefbf292291b50d72481d6ecf
-
SHA512
092491909bcb7e28d370e51fc4a1366e77af8fa3558a9aa10dfa3859f63ff799bf0a6d104059f5075a977f3d39c8b5921a916cf55f449d8d9f7f565e1c29d1a8
-
SSDEEP
6144:Z261k3SHtHHrQnFfqOvS1UQSPjkmk1hG:ZH1kqQnFiv1UHLIG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a37774bfbd638f9d19f2544e8be4ae77_JaffaCakes118
Files
-
a37774bfbd638f9d19f2544e8be4ae77_JaffaCakes118.exe windows:4 windows x86 arch:x86
ce9848ada3a75ca89085a7a904f4cb68
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWriteWatch
_lwrite
HeapCreate
GetDateFormatA
DisconnectNamedPipe
WriteConsoleOutputCharacterW
CreateFileMappingW
WinExec
GetProcessHeap
ReadConsoleOutputCharacterW
IsBadReadPtr
SearchPathW
SetConsoleTitleA
GetNumberFormatA
ExpandEnvironmentStringsW
user32
ModifyMenuA
CharLowerBuffW
SendMessageW
DefMDIChildProcA
GetMenuStringW
BeginDeferWindowPos
gdi32
EnumFontsW
AngleArc
GetEnhMetaFileHeader
Escape
GetDeviceCaps
StrokeAndFillPath
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 854B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 172KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data0 Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE