Static task
static1
Behavioral task
behavioral1
Sample
b2fd55315c7dba6ecf539f0d59a5d759_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b2fd55315c7dba6ecf539f0d59a5d759_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b2fd55315c7dba6ecf539f0d59a5d759_JaffaCakes118
-
Size
27KB
-
MD5
b2fd55315c7dba6ecf539f0d59a5d759
-
SHA1
c3bcfdf861ab3f49055d77676cbdf4ce8f43dbc3
-
SHA256
00a404ac8b865a411b9eed0825aa8a3c4500ee90a7fbfedd0223beb654a03d6c
-
SHA512
84e34b2c98f71bc1ddebddfcde0f8e1e2f83cd5274bb77d827a1e77ffc84023955832df604efdf53d7af623f7169fbc54796f0c92af62f1c9b3acc316b3fe9e1
-
SSDEEP
384:B4XTTeYkseGf9T44dAkMQfQHbrgG/cQ6i+B8D7rFgz:iX9kz2t7kf/fHrFg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b2fd55315c7dba6ecf539f0d59a5d759_JaffaCakes118
Files
-
b2fd55315c7dba6ecf539f0d59a5d759_JaffaCakes118.exe windows:4 windows x86 arch:x86
fe5db82acba4930d8b7ddc4dcab540b2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
pbvm80
ord137
kernel32
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetCommandLineA
GetCPInfo
IsDBCSLeadByte
GetModuleHandleA
GetStartupInfoA
GetVersion
ExitProcess
GetACP
GetOEMCP
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
LCMapStringW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
RtlUnwind
VirtualFree
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
LoadLibraryA
WriteFile
GetStringTypeA
GetStringTypeW
HeapFree
HeapAlloc
VirtualAlloc
GetProcAddress
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ