Static task
static1
Behavioral task
behavioral1
Sample
ba907ac1e311d847033d3566e5f6db8d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ba907ac1e311d847033d3566e5f6db8d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ba907ac1e311d847033d3566e5f6db8d_JaffaCakes118
-
Size
69KB
-
MD5
ba907ac1e311d847033d3566e5f6db8d
-
SHA1
4b4452e61c9af23303c5362e1a69e7352d9cc292
-
SHA256
03519a562c07ddfe3ecf8e1bae5334455ba5eefff23283bef4f7dbc136130d0e
-
SHA512
e6838f9e708daa0bd8dfe9f28c45db410761402865c08197c991cff595a8eeda038b9605b786f0015cf4802a2d19e53ca2ad7856bc68824b277d2aa0a46869ed
-
SSDEEP
1536:aY2zrVO0kexzty8tQ2UfJem+W53iE+Hed9H0l1m9yFh48:afo0kexzs8t8oY4+d9Hc1Gy3T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ba907ac1e311d847033d3566e5f6db8d_JaffaCakes118
Files
-
ba907ac1e311d847033d3566e5f6db8d_JaffaCakes118.exe windows:3 windows x86 arch:x86
bd9fd178f9f25f2d096853c49ab70cfe
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateFileA
CreateThread
DeleteCriticalSection
DisableThreadLibraryCalls
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetTickCount
HeapAlloc
HeapDestroy
InterlockedExchange
InterlockedIncrement
LoadLibraryA
LocalAlloc
LocalFree
MultiByteToWideChar
UnhandledExceptionFilter
VirtualAlloc
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ