Static task
static1
Behavioral task
behavioral1
Sample
d6bd2524864603c12d3cb19428e9570b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6bd2524864603c12d3cb19428e9570b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d6bd2524864603c12d3cb19428e9570b_JaffaCakes118
-
Size
20KB
-
MD5
d6bd2524864603c12d3cb19428e9570b
-
SHA1
62a83a10f843189324c07f764035d0e1312c5490
-
SHA256
a748a361ba2659705e893c960c298938919f5cbb04d0e519fea51cbcbdbee148
-
SHA512
f269d944cf2ad6372f90c9a8bd301061dc0d1f369ed1534c5bf2f86de374292fbf7d87a71f2c9616b5dd9d9d5e5841d54726133aac2a49a5ea7d6a35c5276515
-
SSDEEP
192:sCOz3V+tjVMXHo81Se3cikHvBQ74QxGWOy/FaqS+KnNKmcaXwcs1AVi/1XVOl0Ga:s7e2YnO74AGIKpcKwEVKtVOl0szto
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d6bd2524864603c12d3cb19428e9570b_JaffaCakes118
Files
-
d6bd2524864603c12d3cb19428e9570b_JaffaCakes118.exe windows:4 windows x86 arch:x86
83bd43edd66cf250bf2209cd445bea10
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
CreateEventA
GetFileAttributesA
lstrcatA
GetProcAddress
SetEvent
LoadLibraryA
GetModuleFileNameA
GetModuleHandleA
CloseHandle
lstrcpyA
lstrlenA
SetFilePointer
SetFileAttributesA
CreateThread
WaitForSingleObject
GetVersionExA
WriteFile
ExitThread
GetTempPathA
ExitProcess
RtlUnwind
CreateFileA
user32
MsgWaitForMultipleObjects
DispatchMessageA
TranslateMessage
PeekMessageA
ShowWindow
CreateWindowExA
SetThreadDesktop
CreateDesktopA
CharToOemA
EndPaint
wsprintfA
DestroyWindow
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ