Static task
static1
Behavioral task
behavioral1
Sample
0a7767423d5ac670bfb01afd9e167718_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0a7767423d5ac670bfb01afd9e167718_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0a7767423d5ac670bfb01afd9e167718_JaffaCakes118
-
Size
157KB
-
MD5
0a7767423d5ac670bfb01afd9e167718
-
SHA1
b0a946a9db3e969bbae07b1b3f9402ba2164edb2
-
SHA256
0dd6f161b9b95b25f12dbebc0ee34423dfe8248e523ac418ca8345188d1d7c71
-
SHA512
05cdd399310b973b65a13b1b807ace31b0c89da1aa02d01616166d5d2a0678b47860d1b78c0ddce2d0582e2b1867a40192f1741e29a1e4a35bf84c7bd6a36632
-
SSDEEP
3072:8+2rDwGHlJVnL0PWwtwrNHhKwqd09rpERjgF+XmNJShAnbbaDi85WDSs5/+m4:DYDwgfRlwtwriNdMrCmNJShAnbhn5/+1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a7767423d5ac670bfb01afd9e167718_JaffaCakes118
Files
-
0a7767423d5ac670bfb01afd9e167718_JaffaCakes118.exe windows:4 windows x86 arch:x86
f433e7fcc51e68080022754836705744
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
VirtualAlloc
VirtualFree
user32
MessageBoxA
Sections
.text Size: - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
6.cfu549 Size: - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zaien2la Size: 148KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
v9..8oxf Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ