Static task
static1
Behavioral task
behavioral1
Sample
14b90ca1dfe1bf4e114377bf2c7df8fb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
14b90ca1dfe1bf4e114377bf2c7df8fb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
14b90ca1dfe1bf4e114377bf2c7df8fb_JaffaCakes118
-
Size
72KB
-
MD5
14b90ca1dfe1bf4e114377bf2c7df8fb
-
SHA1
daf80579486a16aac77bd273db4b74657c2e432a
-
SHA256
a270320f4a73308bdc9b4fbf62c4a2e80a166fefdebc85408c10b99c97f5ce04
-
SHA512
bd38f007bad62b341711f6b6203fedb94cc2062ad49c715db0e134145c2481cd8d50f9d093f700f3b5adba554fc1c47688176c83afce49de894ec7351b664632
-
SSDEEP
1536:AJhEOPO7rDbYZI1dubu7iwBKg0BPTlophl49xc6HaoEUAlNEc6HcT66vlmY2n:wZO7rDbYZIsAiwcg0dloLgc6HRhAlica
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14b90ca1dfe1bf4e114377bf2c7df8fb_JaffaCakes118
Files
-
14b90ca1dfe1bf4e114377bf2c7df8fb_JaffaCakes118.exe windows:4 windows x86 arch:x86
8512d986c2c94d76c1a0dfc3a97a4f99
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetLastError
InterlockedIncrement
ReleaseMutex
CreateMutexA
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsGetValue
TlsSetValue
WaitForSingleObject
msvcrt
_write
_fileno
_fstat
_isatty
_lseek
_open
_read
_close
_assert
_cexit
_errno
_fileno
_fmode
_fpreset
_HUGE
_iob
_setmode
__getmainargs
abort
atexit
fclose
fflush
fprintf
fread
free
fseek
fwrite
getc
isspace
isupper
__p__environ
malloc
memchr
memcpy
memmove
signal
strcmp
strtol
strtoul
system
__set_app_type
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 1008B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE