Static task
static1
Behavioral task
behavioral1
Sample
0a36f7080317421f2aee496e1f53ff2b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0a36f7080317421f2aee496e1f53ff2b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0a36f7080317421f2aee496e1f53ff2b_JaffaCakes118
-
Size
320KB
-
MD5
0a36f7080317421f2aee496e1f53ff2b
-
SHA1
0dddf877464c0451c8887abbb2d38ceff25210fe
-
SHA256
d2dac6d56d870b205df500b29424b284fe78dadb9951ded39f8468408219c594
-
SHA512
69ecf74371cb1c574363d0873bd8389c90b68cec0eadc28facaeea3b7c531737626c183b2b784630d3b6cc6b1ed78c0652e7b8ec6f96d9e3d60e0213a9d7a704
-
SSDEEP
6144:lnvDpN/kFC9zNJH7n8Oc3FVSz/I3KFBJgQjeUXEjtQ:1pN/YiNJz8OiYbI3K1gQ6eEjt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a36f7080317421f2aee496e1f53ff2b_JaffaCakes118
Files
-
0a36f7080317421f2aee496e1f53ff2b_JaffaCakes118.exe windows:4 windows x86 arch:x86
f433e7fcc51e68080022754836705744
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
VirtualAlloc
VirtualFree
user32
MessageBoxA
Sections
.text Size: - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
v1qprf.q Size: - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
b3miersd Size: 311KB - Virtual size: 312KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vqzg5ycc Size: 4KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE