Static task
static1
Behavioral task
behavioral1
Sample
af45cb38eba1da04f77144ffa9abd393_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
af45cb38eba1da04f77144ffa9abd393_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
af45cb38eba1da04f77144ffa9abd393_JaffaCakes118
-
Size
95KB
-
MD5
af45cb38eba1da04f77144ffa9abd393
-
SHA1
4869eaabc6e7931fb948b6b2426a65a8ec8cda0f
-
SHA256
969210e20df92a31827017d6a8bdea956f2ac1b221bbed221daca0fdb6188451
-
SHA512
28e66c9256281d33220954695fd93823ff8716533974e0f7013b78d26b0656e213ca7dbbb0e937f02e5ad6414a5d8e115d5c736623a348e0332c6d555e4bc3c3
-
SSDEEP
1536:E62jsXzBbQMnUVq1hD5jYJuv6kS/8A0d9c7/sFbU68NiXDQYx8wxBqm27CTqOiaw:Mjs5IahD5Vu/8AgukFbtGiXD3G9aqOx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource af45cb38eba1da04f77144ffa9abd393_JaffaCakes118
Files
-
af45cb38eba1da04f77144ffa9abd393_JaffaCakes118.exe windows:4 windows x86 arch:x86
f433e7fcc51e68080022754836705744
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
VirtualAlloc
VirtualFree
user32
MessageBoxA
Sections
.text Size: - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 384KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
6d7xjy2o Size: - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1a0saugi Size: 83KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.6j8jstd Size: 10KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE