Static task
static1
Behavioral task
behavioral1
Sample
3e641d14fba0008d08481342decec35e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3e641d14fba0008d08481342decec35e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3e641d14fba0008d08481342decec35e_JaffaCakes118
-
Size
133KB
-
MD5
3e641d14fba0008d08481342decec35e
-
SHA1
51e0dba792432e7c31e972f03e2cad161a6c0054
-
SHA256
61335dd813e894c52a20a5fa741a406b8f762252f557dfcc5bfa316378113964
-
SHA512
ee173b44bff225154a9125b1696df87e1c0f2692382cb94aac26c15f0713f9454190cda5df2141f223d2a49af3eefde9a3a971b96b9f69bd02aace974bc28666
-
SSDEEP
3072:ng4WxxY28wD+65RANKM42cp1EuGfYeWd:LvCBRANh46
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e641d14fba0008d08481342decec35e_JaffaCakes118
Files
-
3e641d14fba0008d08481342decec35e_JaffaCakes118.exe windows:4 windows x86 arch:x86
59ac44575f10df6a5328af7a9f02ddb3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SuspendThread
LocalAlloc
LocalFree
ExitProcess
SetEvent
GetComputerNameA
GetProcAddress
LoadLibraryA
VirtualFree
VirtualProtect
HeapFree
GetProcessHeap
VirtualProtectEx
VirtualAllocEx
GetCurrentProcess
GetLastError
GetModuleHandleA
GetCurrentThread
GetCurrentProcessId
CreateFileA
GetFileSize
HeapAlloc
InterlockedExchange
RtlUnwind
VirtualQuery
user32
DestroyWindow
DispatchMessageA
GetMessageA
SetWindowLongA
ShowWindow
CreateDialogParamA
RegisterClassA
PostQuitMessage
DefWindowProcA
PostMessageA
Sections
.text Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ