Static task
static1
Behavioral task
behavioral1
Sample
411da9dec86db636e38e2d7244f3fa94_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
411da9dec86db636e38e2d7244f3fa94_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
411da9dec86db636e38e2d7244f3fa94_JaffaCakes118
-
Size
93KB
-
MD5
411da9dec86db636e38e2d7244f3fa94
-
SHA1
349ea8bd37f8cb56e5a1991a2ff6bd4a7fd81bff
-
SHA256
d7591a8071a4c6e6b406c76b13e483b84c8cc2b60892e9412f17cdf636a1e23c
-
SHA512
3c424c2cc02a120a366852c5f838e12c207d79bd033c20cd7c460e879ce89381529b8f145cdaea728f6f00b596af11cff047e7c5412c0e33a7f499998477d287
-
SSDEEP
1536:qJmaLWQa+NWAKxFN1Gt5BarSMCGeSnZQAPS3HzTTaVEtT6dH8IVvby4gB8slC1aM:AJGeSnZ1qTvD10vb0VlC12+Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 411da9dec86db636e38e2d7244f3fa94_JaffaCakes118
Files
-
411da9dec86db636e38e2d7244f3fa94_JaffaCakes118.exe windows:4 windows x86 arch:x86
9c8decf3582072f6edfc385a689f44f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateDirectoryA
CreateFileA
DeleteFileA
ExitProcess
FreeLibrary
GetCommandLineA
GetFileTime
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
lstrcatA
lstrcmpiA
RemoveDirectoryA
SetFileTime
VirtualAlloc
VirtualFree
WriteFile
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
��:~.� Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 14KB - Virtual size:
Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE