Static task
static1
Behavioral task
behavioral1
Sample
a973d65d4a8d730bd1aa793dd0649571_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a973d65d4a8d730bd1aa793dd0649571_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a973d65d4a8d730bd1aa793dd0649571_JaffaCakes118
-
Size
361KB
-
MD5
a973d65d4a8d730bd1aa793dd0649571
-
SHA1
d3a39cd91c5114804736697755e4c1b7d3983b3d
-
SHA256
68bbb47394a3997c55aa0302df869e8c1b1518507e7c7a5669a2793def82c357
-
SHA512
858a5b968b30ae4dedc671fa8e306f4522366adf0f7c568d70847dc1e65967d44fc68507e8c61650f62febdb8272f8149632cc3b9cc0bd9adb892b133dedc410
-
SSDEEP
6144:GIT72FfwNou5B6EsFAKXASXbJ7kGK6AexCNwp+uspavzZC0Y3YA72hkt9saV5OTA:10s5BaXf7kH6AisUc0964kt9HVcG9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a973d65d4a8d730bd1aa793dd0649571_JaffaCakes118
Files
-
a973d65d4a8d730bd1aa793dd0649571_JaffaCakes118.exe windows:4 windows x86 arch:x86
7e32191ed5d7cf49bf1f86011d2a6284
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
FreeResource
ResumeThread
VirtualProtectEx
WriteProcessMemory
VirtualAllocEx
GetThreadContext
CreateProcessA
LockResource
LoadResource
SizeofResource
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryA
FreeLibrary
msvcrt
_ftol
_CIpow
malloc
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 586B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 356KB - Virtual size: 356KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DexCrypt Size: 78B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DexCrypt Size: 96B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ