Static task
static1
Behavioral task
behavioral1
Sample
0b26054997ed054c9aca46f9779c3f43_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b26054997ed054c9aca46f9779c3f43_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0b26054997ed054c9aca46f9779c3f43_JaffaCakes118
-
Size
3KB
-
MD5
0b26054997ed054c9aca46f9779c3f43
-
SHA1
fa0c5298c7414c5a68bef3ad14e8511995ae8914
-
SHA256
b58fddf8b5c6575cc3bdcdf7003597da2db98cb4b5e88d18f6db20663305b9ed
-
SHA512
159eef3164aa96610671e00db3a90d04f65df9425082f3a856747e5e9f0a9bdfa94136832677d5affe6336602ed79656742f245c35fb1b259fac30bd5756ab13
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b26054997ed054c9aca46f9779c3f43_JaffaCakes118
Files
-
0b26054997ed054c9aca46f9779c3f43_JaffaCakes118.exe windows:4 windows x86 arch:x86
d559e00ba5310306d9edcf1dfa7b176c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateRemoteThread
ResumeThread
Sleep
VirtualAllocEx
WriteProcessMemory
CreateProcessA
Sections
.text Size: 1024B - Virtual size: 694B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 214B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE