Static task
static1
Behavioral task
behavioral1
Sample
54f4ed9dfa86775c56515fb055a0eb28_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
54f4ed9dfa86775c56515fb055a0eb28_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
54f4ed9dfa86775c56515fb055a0eb28_JaffaCakes118
-
Size
532KB
-
MD5
54f4ed9dfa86775c56515fb055a0eb28
-
SHA1
95dd27c8b65ca9f2b1844653e44d26dd00ae9b61
-
SHA256
bab2b3e5514207bef7444887b920a962bf8c6e9e08a208c914bbd187ea0218a4
-
SHA512
5fd9bee861ac11b8be8419b2ea37eb6d2460ccc189b94f2e448976b8bbb976d303d673c8f7782dafdb20f55c81b272190699bffbee07b477e4c43529bcc012aa
-
SSDEEP
6144:XZlnEv2AoKKk+RzTERnwYv7HK67QRtOnGPUccRKbbEzmU0M2wrNYWdcnHNnv/3+l:/C2T1zKnwYz571nGccc2gb0Ha1Mtv/3k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 54f4ed9dfa86775c56515fb055a0eb28_JaffaCakes118
Files
-
54f4ed9dfa86775c56515fb055a0eb28_JaffaCakes118.exe windows:4 windows x86 arch:x86
928abb7fce25ae0d55a9503efb7c0bed
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
VirtualProtect
GetProcAddress
HeapCreate
HeapDestroy
HeapFree
HeapAlloc
RtlUnwind
CloseHandle
CreateFileA
ExitProcess
LCMapStringA
GetCurrentProcess
LoadLibraryA
user32
CloseWindow
CharLowerBuffA
CreateWindowExA
wsprintfA
SetWindowLongA
advapi32
RegOpenKeyA
RegCreateKeyA
RegEnumKeyA
RegDeleteKeyA
RegCloseKey
RegQueryValueA
RegDeleteValueA
RegEnumValueA
RegSetValueA
Sections
.text Size: 263KB - Virtual size: 264KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ultra Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ultra Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ