Static task
static1
Behavioral task
behavioral1
Sample
3b6c8c7f2990689fa6bb521e19846b83_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3b6c8c7f2990689fa6bb521e19846b83_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3b6c8c7f2990689fa6bb521e19846b83_JaffaCakes118
-
Size
30KB
-
MD5
3b6c8c7f2990689fa6bb521e19846b83
-
SHA1
a99dd42636a7913b4b048eb454b4482ae386aefc
-
SHA256
556b5414acba86afe097f6a4496e5c025f5a93c2c85115ba31d4d18c346ec541
-
SHA512
c5042f7da871e897400c9d6db2b76afe4558f5cc88b195d69904849e368f119570ecb1adc3cace1babaecb588047dbb4a350d6cb1912e78a73348569d59ffb2f
-
SSDEEP
768:9oZM8Id8yzc7zsfdj5Ok/On52eoZG7cKePQz+ITqEBgF:9oZ98YGXOk/neoZ4WPFcKF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b6c8c7f2990689fa6bb521e19846b83_JaffaCakes118
Files
-
3b6c8c7f2990689fa6bb521e19846b83_JaffaCakes118.exe windows:4 windows x86 arch:x86
d0ce82ba00d2f51a0aca2713ffe33076
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
OpenProcess
lstrcatA
CreateDirectoryA
lstrcmpiA
GetProcAddress
CopyFileA
SetFileAttributesA
VirtualAllocEx
CreateRemoteThread
Process32Next
LocalAlloc
GetModuleFileNameA
GetModuleHandleA
CreateToolhelp32Snapshot
CloseHandle
LocalFree
WriteProcessMemory
DeleteFileA
Process32First
lstrlenA
LoadLibraryA
CreateFileA
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
Sections
.text Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
p4hl5sqt Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
21inykz3 Size: 4KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE