Static task
static1
Behavioral task
behavioral1
Sample
b10061327a91142bceabfaf1e9b273b9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b10061327a91142bceabfaf1e9b273b9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b10061327a91142bceabfaf1e9b273b9_JaffaCakes118
-
Size
794KB
-
MD5
b10061327a91142bceabfaf1e9b273b9
-
SHA1
d6b52f6275161a22829e5af8d701aefc5f39424a
-
SHA256
45d61a614b1cf8e0aee3ec47ca4a61d5667070da08e1f21792c1ed1e94349158
-
SHA512
c59f809967813f08a8dfcd1fc216aff319ac46249242a2f7a970eb88b9fe5028509bb3a65d207774cbc0dafcd7eefd23bfd6ab3de39ffd751fab1afd560d9931
-
SSDEEP
24576:T3S168AOy3xMk+RdKVwb3N3C4s3BweOpuB:rS7yqTR0VAJsRJau
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b10061327a91142bceabfaf1e9b273b9_JaffaCakes118
Files
-
b10061327a91142bceabfaf1e9b273b9_JaffaCakes118.exe windows:4 windows x86 arch:x86
32ca8d5fca836efa8536566f0eee05c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleA
LoadLibraryA
ExitProcess
CreateThread
VirtualAlloc
VirtualFree
ExitThread
GetSystemDirectoryA
CreateFileA
WriteFile
CloseHandle
FreeLibrary
GetFileTime
CompareFileTime
GetModuleFileNameA
GetCommandLineA
Sections
BitArts Size: 32KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 720KB - Virtual size: 720KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE