Static task
static1
Behavioral task
behavioral1
Sample
c7548fdd1b7d64c13985b3c7c298d25a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c7548fdd1b7d64c13985b3c7c298d25a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c7548fdd1b7d64c13985b3c7c298d25a_JaffaCakes118
-
Size
45KB
-
MD5
c7548fdd1b7d64c13985b3c7c298d25a
-
SHA1
14360b959b67b52e9ecaaceb564677f41f7d1f8e
-
SHA256
0492e973e60055ce4124543a1466b426d6053148ef562c434fbfde72d526a593
-
SHA512
78730b217df10d8f79b1777bd8e0c2541513472fcc70728cea0811bfe6437792a79318fad3a21628c7c714ab12e23d6b485ea04c47ad2d38caa165bc36de48a4
-
SSDEEP
768:6NZAZR2hc3Fv7JdtXPslsgdfjnikOBz70T4KknHT0xn9nH7le:sZAahwFvNdt8hisTPqT0/nbQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c7548fdd1b7d64c13985b3c7c298d25a_JaffaCakes118
Files
-
c7548fdd1b7d64c13985b3c7c298d25a_JaffaCakes118.exe windows:4 windows x86 arch:x86
c228dd4a8560fabd1fb51b42fe4d1c1d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentDirectoryA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetTickCount
GetVersionExA
HeapAlloc
HeapFree
HeapReAlloc
GetACP
IsDebuggerPresent
LocalAlloc
LocalFree
MulDiv
ReadFile
RtlFillMemory
RtlMoveMemory
Sleep
VirtualAlloc
VirtualFree
VirtualProtect
WriteFile
ExitProcess
DeviceIoControl
CreateThread
CreateFileA
HeapSize
CloseHandle
wsock32
WSAStartup
WSACleanup
gethostbyname
user32
CopyIcon
GetWindowRgn
MonitorFromRect
RemoveMenu
ScrollDC
SetTimer
SwitchDesktop
wsprintfA
CharToOemA
gdi32
GdiFlush
SetBkColor
SetBkMode
SetTextColor
BitBlt
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE