Static task
static1
Behavioral task
behavioral1
Sample
0ba335421d39a0d9258149053f553e62_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ba335421d39a0d9258149053f553e62_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0ba335421d39a0d9258149053f553e62_JaffaCakes118
-
Size
51KB
-
MD5
0ba335421d39a0d9258149053f553e62
-
SHA1
8268d46dba587ffc1d67d7bac19d07d4617e876a
-
SHA256
0e4a9819fee5d9579735f5c7fb8071dee1651b483bcbcaead2bf3a8b853dffb3
-
SHA512
e4be80e9356e6efd6fd406798d7bbf565bbcf5c27896d627e9a2a2e15f14e32a5428c5b60a4f86fe8c3cb828cabfdad714d1499a26118c8f932a07df6417ecec
-
SSDEEP
768:8F8nv9bO+2QwFG16KPGEbK3kgBX97CuCY4kqHWRcAVwBb3F9XtTvor/Xdkyj1d4:8+nvyFSWUtgXCY4XwcAVk1joLNkypy
Malware Config
Signatures
Files
-
0ba335421d39a0d9258149053f553e62_JaffaCakes118.exe windows:4 windows x86 arch:x86
93b5201d57470bdee489ff3f4140bac0
Code Sign
84:15:16:04:33:b8:01:40:94:97:a4:ea:4b:2a:49:e1:c9:82:66:b7Signer
Actual PE Digest84:15:16:04:33:b8:01:40:94:97:a4:ea:4b:2a:49:e1:c9:82:66:b7Digest Algorithmsha1PE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAllocEx
VirtualFreeEx
VirtualProtectEx
ReadProcessMemory
WriteProcessMemory
CreateProcessA
GetModuleFileNameA
GetCurrentProcess
SetThreadContext
ResumeThread
GetThreadContext
advapi32.dll�
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
msvcrt.dll�
malloc
fclose
??3@YAXPAX@Z
fread
fseek
fopen
free
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CBtrl Size: 42KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sssa Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ