Static task
static1
Behavioral task
behavioral1
Sample
f71453951cd90ac4bba1ad6e36f61002_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f71453951cd90ac4bba1ad6e36f61002_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f71453951cd90ac4bba1ad6e36f61002_JaffaCakes118
-
Size
2KB
-
MD5
f71453951cd90ac4bba1ad6e36f61002
-
SHA1
ce0e21eaf77b6fb9099e073a1ecb387c3bc99833
-
SHA256
b797cda1795eb8b318cc30e5d5d07467ae1938a32f61911932f9115728383560
-
SHA512
eb1cb046d09e498e6c71f11cbd2fa54531c6446ec34107dfab78d138a8d0da7e773efbff9121d0c3226b0262f73c2f26859c3eb470737d1614174441ee36754b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f71453951cd90ac4bba1ad6e36f61002_JaffaCakes118
Files
-
f71453951cd90ac4bba1ad6e36f61002_JaffaCakes118.exe windows:4 windows x86 arch:x86
23fe06855b4d9582bef562e984f6eaa4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
OpenProcess
ExitProcess
GetModuleFileNameA
WriteProcessMemory
GetCurrentProcessId
user32
GetWindowThreadProcessId
FindWindowA
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE