Static task
static1
Behavioral task
behavioral1
Sample
b7be884005ae85da161499fe91da7007_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b7be884005ae85da161499fe91da7007_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b7be884005ae85da161499fe91da7007_JaffaCakes118
-
Size
733KB
-
MD5
b7be884005ae85da161499fe91da7007
-
SHA1
17946963e65ecbdb52625af830e726726529c038
-
SHA256
e294562beb134cca5fc36770d5c40f5b5968bf40fadf8ea037e054883ba438ac
-
SHA512
9d1a4256aba63eca48843818c3499e3ea79a9dee0f4863cd8e822da5909043650fd76d0e32db224376305f621ce8eb9ebdca3042c5a150660014af76f15d4a29
-
SSDEEP
12288:rlxrSmcMU8/c2gFEns8QEpZMZyXDPFHQrrNw+m405OyUZQRvpdtXwiimPa/cOyEF:YMBBgZSKZqPFHQrRw+mI5aRxrDi6aUOZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7be884005ae85da161499fe91da7007_JaffaCakes118
Files
-
b7be884005ae85da161499fe91da7007_JaffaCakes118.exe windows:4 windows x86 arch:x86
0ccfeb2d29592c7236c5d12b8b2b1217
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
VirtualProtect
GetProcAddress
HeapCreate
HeapDestroy
HeapFree
HeapAlloc
RtlUnwind
CreateFileA
ExitProcess
LCMapStringA
GetCurrentProcess
LoadLibraryA
CloseHandle
user32
CreateWindowExA
SetWindowLongA
CloseWindow
CharLowerBuffA
wsprintfA
advapi32
RegDeleteValueA
RegEnumValueA
RegCreateKeyA
RegEnumKeyA
RegQueryValueA
RegDeleteKeyA
RegOpenKeyA
RegSetValueA
RegCloseKey
Sections
.text Size: 616KB - Virtual size: 616KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 184KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 17B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ