Static task
static1
Behavioral task
behavioral1
Sample
ee8ea70acfdd946abda3e1623432ffee_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee8ea70acfdd946abda3e1623432ffee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ee8ea70acfdd946abda3e1623432ffee_JaffaCakes118
-
Size
61KB
-
MD5
ee8ea70acfdd946abda3e1623432ffee
-
SHA1
bd7094a3b2e9a6a95a7fc63b5ffd5eb7bbbf5170
-
SHA256
fa3ab6ee18847435c989b3665f4ccc1c51379984981c97ba36923443b1faaa1e
-
SHA512
9d62b9ad361052ddefe3582cfcb957ae123c8d0f8bb04d0cb5a3044782e8be86cbe87b3cc5f5dcea517e7676e0a7701b8c563c531ee42b41e632a3d083ee51f1
-
SSDEEP
1536:RUwOYD6LwKDoBJZFlQtNAhWWQpxHmZwhC7zWN:RUwOYNK0lQtIQphqnz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ee8ea70acfdd946abda3e1623432ffee_JaffaCakes118
Files
-
ee8ea70acfdd946abda3e1623432ffee_JaffaCakes118.exe windows:4 windows x86 arch:x86
943aa8b146adf982d40e570798327ea2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
crtdll
memset
strncpy
memcpy
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
HeapFree
HeapAlloc
GetModuleFileNameA
CreateProcessA
GetThreadContext
VirtualAllocEx
WriteProcessMemory
SetThreadContext
ResumeThread
DeleteFileA
WriteFile
CloseHandle
CreateFileA
ReadFile
HeapReAlloc
Sections
.code Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.flat Size: 512B - Virtual size: 125B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE