Static task
static1
Behavioral task
behavioral1
Sample
b4ea0f34ec9a52b0f2b7dbeb3724daed_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b4ea0f34ec9a52b0f2b7dbeb3724daed_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b4ea0f34ec9a52b0f2b7dbeb3724daed_JaffaCakes118
-
Size
194KB
-
MD5
b4ea0f34ec9a52b0f2b7dbeb3724daed
-
SHA1
5dd03cb0de4ed5b304aab2fe4d408709df4700bd
-
SHA256
2cca5507975455d5e5972ae7481ce2f601a623481405e5a7c82f7e3e13bf8f7c
-
SHA512
fd91804eba81739285c6f6c5a3085f17f28e1a3a2f55ee309b274089b10b526b90110f37fa1ebd6500e14a847774f2a196ce7c83348cf78f821dd81569e1da76
-
SSDEEP
3072:EvfInhSij4vLk7EzRediHAsKjjrbXIWUljZF8s2lRQEkvFXlmFSpZ:Evin4v4oRxgsKj/sW4+lRINX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b4ea0f34ec9a52b0f2b7dbeb3724daed_JaffaCakes118
Files
-
b4ea0f34ec9a52b0f2b7dbeb3724daed_JaffaCakes118.exe windows:4 windows x86 arch:x86
f53ea87680c786c4b2d5bbb4fd8319e3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
LockResource
VirtualAllocEx
GetLastError
GlobalAlloc
IsBadReadPtr
GetOEMCP
GetModuleHandleW
LoadLibraryA
GetProcAddress
lstrlenW
GetCommandLineA
ExitThread
GetModuleHandleA
ExitProcess
GetCommandLineW
oleaut32
SafeArrayGetUBound
OleLoadPicture
SysFreeString
SafeArrayGetElement
VariantChangeType
SysStringLen
version
GetFileVersionInfoSizeA
VerInstallFileA
GetFileVersionInfoA
Sections
.text Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ