Static task
static1
Behavioral task
behavioral1
Sample
5814270433ae5dce5fea8abd750b2162_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
5814270433ae5dce5fea8abd750b2162_JaffaCakes118
-
Size
376KB
-
MD5
5814270433ae5dce5fea8abd750b2162
-
SHA1
09d54fce2423efd9ad7027284f618475d667b812
-
SHA256
735923e89aaf5905417b60f2d8623c96879bc5cdeaeb00eab20163e36217d36f
-
SHA512
4fa329c53bae87aab05c4f1bd752f43a36aaf11100377a1edba1128debd23f74144ad289d68dce901ca4f32590ee03508ab73416eec5ab09a72a32fd248162a4
-
SSDEEP
6144:ZFZ/+7tnUBSpJEXtuPDFT/DInh6KeYebYmZg0tDxeV1nqnbaULA14DuY1khSd:A5nUBuJ205/DInQKeYedZg0tteVVqbx7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5814270433ae5dce5fea8abd750b2162_JaffaCakes118
Files
-
5814270433ae5dce5fea8abd750b2162_JaffaCakes118.exe windows:4 windows x86 arch:x86
3630ba92841e05ed700f079eb099be44
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleA
CloseHandle
GetModuleFileNameA
LockResource
LoadResource
SizeofResource
FindResourceA
CreateMutexA
OpenMutexA
HeapFree
HeapReAlloc
HeapAlloc
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 358KB - Virtual size: 357KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ