Static task
static1
Behavioral task
behavioral1
Sample
a54850819bb541acfc552220a0d9042b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a54850819bb541acfc552220a0d9042b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a54850819bb541acfc552220a0d9042b_JaffaCakes118
-
Size
25KB
-
MD5
a54850819bb541acfc552220a0d9042b
-
SHA1
713b5e168e8865728ff4f88fbf0f8065aaa6d812
-
SHA256
18497f67026598026bddee2f33dcd9eac4f4711142312e4144b89c1853f0dedc
-
SHA512
c9f30aacc138a8dc5302244d8a6bda3e81824080b3b32e6a53b3aa501420ded4cef13ceeba01dcf6b34e0789e02f4b05fdb36e3560c21d9a599769aa89ba2455
-
SSDEEP
384:Hcjuz+CJlxXpX5t37+qXInYDxRuvaP2XOzm63y1+0yajuEh3Dy7Iw:1+epX5J71sYDx9zmc0yajh3O7P
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a54850819bb541acfc552220a0d9042b_JaffaCakes118
Files
-
a54850819bb541acfc552220a0d9042b_JaffaCakes118.exe windows:4 windows x86 arch:x86
4099ddc5a4cf72d27b12ed57e9ee26eb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
GetModuleHandleA
GetProcAddress
GetSystemTime
GetVersion
ExitThread
ReadFile
Sleep
VirtualAlloc
VirtualFree
WaitForSingleObject
ExitProcess
CreateThread
LoadLibraryA
CloseHandle
advapi32
RegEnumValueA
RegCloseKey
RegOpenKeyA
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zjmupvn Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: - Virtual size: 740KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE