Static task
static1
Behavioral task
behavioral1
Sample
ad90ade6aabfdaee4f1d9e2037df8c11_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ad90ade6aabfdaee4f1d9e2037df8c11_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ad90ade6aabfdaee4f1d9e2037df8c11_JaffaCakes118
-
Size
93KB
-
MD5
ad90ade6aabfdaee4f1d9e2037df8c11
-
SHA1
aa239bf1b16ae813991a5673403194332dac87ea
-
SHA256
a0da1836c8b4d105d77d1af75ec6e459bebb7462597cce78f7d4dd23097bbff7
-
SHA512
90d9cfa8383890f8e29afe6732b1b361c223b1989e66cc5dd7499f92c2a03d51beacd4d27d8fc8efade41ab88b7b94a34b70cb90fe9c82f966ae0e951219be92
-
SSDEEP
1536:a3bwOAiXeqRh4dranouy8S/tRARnAB71pBEBqljG5AtKJYEYLoZPrI4GIqEJ88/9:a3bJADdrCoutSlRsA3EBqljvQJVHDGJY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad90ade6aabfdaee4f1d9e2037df8c11_JaffaCakes118
Files
-
ad90ade6aabfdaee4f1d9e2037df8c11_JaffaCakes118.exe windows:4 windows x86 arch:x86
f433e7fcc51e68080022754836705744
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
VirtualAlloc
VirtualFree
user32
MessageBoxA
Sections
code Size: - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
text Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
7e9f7ji8 Size: - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
d0n9wh6t Size: 65KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3kvz3q7d Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ