Static task
static1
Behavioral task
behavioral1
Sample
b022755aba58930885d9356de9ca428f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b022755aba58930885d9356de9ca428f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b022755aba58930885d9356de9ca428f_JaffaCakes118
-
Size
69KB
-
MD5
b022755aba58930885d9356de9ca428f
-
SHA1
12d8541429ed2a5046adac15d3c288c336a359b6
-
SHA256
2aba74b1808ecd85c887bbfa9dee9f3cf8488b6a7b6be283c5ce9d65caee33b0
-
SHA512
eb703146b6c6acf9108be0fcc2f68964d02128aaab4c72a06002c1949ac840c9fafd761e68f58ac1d3247ad8ef89129838924d47cdfc41f19c8de55a452ef1d1
-
SSDEEP
1536:aY2zrVO0kexzty8tQ2UfJem+W53iE+Hed9H0l1m9yFh4e:afo0kexzs8t8oY4+d9Hc1Gy35
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b022755aba58930885d9356de9ca428f_JaffaCakes118
Files
-
b022755aba58930885d9356de9ca428f_JaffaCakes118.exe windows:3 windows x86 arch:x86
bd9fd178f9f25f2d096853c49ab70cfe
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateFileA
CreateThread
DeleteCriticalSection
DisableThreadLibraryCalls
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetTickCount
HeapAlloc
HeapDestroy
InterlockedExchange
InterlockedIncrement
LoadLibraryA
LocalAlloc
LocalFree
MultiByteToWideChar
UnhandledExceptionFilter
VirtualAlloc
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ