Static task
static1
Behavioral task
behavioral1
Sample
b61a51e94e720e80038d96e641a24617_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b61a51e94e720e80038d96e641a24617_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b61a51e94e720e80038d96e641a24617_JaffaCakes118
-
Size
260KB
-
MD5
b61a51e94e720e80038d96e641a24617
-
SHA1
9a356eb28470f4dae4957df5d8333fb1f049e79a
-
SHA256
36cea0ff1d7f1adce3290f96cabb9006f59b74bf52ceb2272c25bfcec123ddaf
-
SHA512
54065b12ab00f142c75cf9b1ebc0546a76e3efbe392223454b9861e573efd1e8045a157f632e58e0e9bc293a33d4d711eafe147b6ac9891f42ab15de919b7665
-
SSDEEP
6144:2JtuDlYEQguTWUchmWmeuCGqTVKTGTvtWb/B4XOOus0inBQptE:uCEMmTeeqTVKTigb6eV5E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b61a51e94e720e80038d96e641a24617_JaffaCakes118
Files
-
b61a51e94e720e80038d96e641a24617_JaffaCakes118.exe windows:5 windows x86 arch:x86
9d8ee850ddf457969fbd1aecc373b410
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
VirtualProtect
GetProcAddress
HeapCreate
HeapDestroy
HeapFree
HeapAlloc
RtlUnwind
CreateFileA
LCMapStringA
LoadLibraryA
CloseHandle
GetCurrentProcess
ExitProcess
user32
SetWindowLongA
CharLowerBuffA
CreateWindowExA
CloseWindow
wsprintfA
advapi32
RegCreateKeyA
RegCloseKey
RegSetValueA
RegOpenKeyA
RegQueryValueA
RegDeleteValueA
RegDeleteKeyA
RegEnumValueA
RegEnumKeyA
Sections
.text Size: 221KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 236KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ