Static task
static1
Behavioral task
behavioral1
Sample
fd4aa284cc1dbaf4f7786d769fd8b1cc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd4aa284cc1dbaf4f7786d769fd8b1cc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fd4aa284cc1dbaf4f7786d769fd8b1cc_JaffaCakes118
-
Size
72KB
-
MD5
fd4aa284cc1dbaf4f7786d769fd8b1cc
-
SHA1
fadbb3aaab55c7d5afc6211c2cb094ccb58bbbba
-
SHA256
79f67e9be8f34d22aa2755dc2ed12a87bcdf70150d49f419ca0319fac71654b1
-
SHA512
95f5a226212e11c08dc3afc20b312054872b3b68baee26a82a51c5473c15ca7419fe10631e552a3b62517b9aaaf7d257400ab381951f766dcd1491ceddeeb057
-
SSDEEP
1536:BeGJ9f5c7G2G5nr3OxGaXeGFdQTovzC1aCHP+D5y5v26lx9:NJ9f5c7G22OxGaXeGFdQTyzC1ewx9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fd4aa284cc1dbaf4f7786d769fd8b1cc_JaffaCakes118
Files
-
fd4aa284cc1dbaf4f7786d769fd8b1cc_JaffaCakes118.exe windows:4 windows x86 arch:x86
9c8decf3582072f6edfc385a689f44f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateDirectoryA
CreateFileA
DeleteFileA
ExitProcess
FreeLibrary
GetCommandLineA
GetFileTime
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
lstrcatA
lstrcmpiA
RemoveDirectoryA
SetFileTime
VirtualAlloc
VirtualFree
WriteFile
Sections
text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
. Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
. Size: 14KB - Virtual size:
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
. Size: 8KB - Virtual size: 8KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE