Static task
static1
Behavioral task
behavioral1
Sample
d42b78a62f13933eacf382938e34be19_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d42b78a62f13933eacf382938e34be19_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d42b78a62f13933eacf382938e34be19_JaffaCakes118
-
Size
2.7MB
-
MD5
d42b78a62f13933eacf382938e34be19
-
SHA1
f33b76769d05e63c209614af29069c688518f8fc
-
SHA256
40bd57cc6c154b404d18f74fe7ac51c05c6d8f5003441c37682764cd48700b8e
-
SHA512
2b6015955095cb876f2aff485e6a107adac6599dd72bf69ee97cdbbf2a9546c4132ca19913014dd7781a9b0d3931ffbb22da54de31334befa5ecd7fcddd9aaab
-
SSDEEP
49152:vvnKZgzXLFG5ZE3gc+hRRHxgSSzvB7D2kJaJ4wrUWd:vPKibSZRp/qhD2YafrVd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d42b78a62f13933eacf382938e34be19_JaffaCakes118
Files
-
d42b78a62f13933eacf382938e34be19_JaffaCakes118.exe windows:5 windows x86 arch:x86
6080bfe3235cf25f8aae61b780e07a41
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetProcessHeap
HeapFree
GetProcAddress
GetModuleHandleW
GetTickCount
GetModuleFileNameW
SetEnvironmentVariableW
IsWow64Process
OpenProcess
GetLastError
DuplicateHandle
GetCommandLineW
OpenFileMappingW
MapViewOfFile
SetEvent
UnmapViewOfFile
CloseHandle
GetCommandLineA
CreateFileW
CreateFileMappingW
GetFileSizeEx
VirtualAlloc
VirtualFree
LoadLibraryW
ExitProcess
GetModuleHandleA
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xcpad Size: - Virtual size: 240KB
.idata Size: 1024B - Virtual size: 844B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 584B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ