Static task
static1
Behavioral task
behavioral1
Sample
c781816dc19fe5d9e71cc8b6b81111fd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c781816dc19fe5d9e71cc8b6b81111fd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c781816dc19fe5d9e71cc8b6b81111fd_JaffaCakes118
-
Size
508KB
-
MD5
c781816dc19fe5d9e71cc8b6b81111fd
-
SHA1
2de902d418598b23dc1f18394894e724016a8e06
-
SHA256
12f9e4d4534377219564dbd12ab0de8ca68987f3ba36442edfb1aca442bf0fee
-
SHA512
5818b6da043165fcf474b02cc116f7c6452875b973a15c7b31f96381f11184d81d7083f34e2e6467e672630527eeebbc608e975bdb9a6e66c8397cd9be665c6d
-
SSDEEP
6144:7pQ8WrLPqmbBuXIrYgD/fhpSJfrfpxg0HvrgNHWkqOj/CsQ+Vrf10H+DBBKxSHzh:W8dwk9Oilw06AI0KqaBKxwZvA4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c781816dc19fe5d9e71cc8b6b81111fd_JaffaCakes118
Files
-
c781816dc19fe5d9e71cc8b6b81111fd_JaffaCakes118.exe windows:4 windows x86 arch:x86
f433e7fcc51e68080022754836705744
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
VirtualAlloc
VirtualFree
user32
MessageBoxA
Sections
.text Size: - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pz2c4z6v Size: - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
u5luzs54 Size: - Virtual size: 400KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4zsmkvhy Size: 454KB - Virtual size: 456KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
lb53l0mr Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ