Static task
static1
Behavioral task
behavioral1
Sample
b0d99d50a36a88ae2093dcadea6d8330_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b0d99d50a36a88ae2093dcadea6d8330_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b0d99d50a36a88ae2093dcadea6d8330_JaffaCakes118
-
Size
120KB
-
MD5
b0d99d50a36a88ae2093dcadea6d8330
-
SHA1
92f59dcad9781199a339a7160a63934d4221bd7e
-
SHA256
a52df572680ed21657305c3746c0ba80fe7c391929c3c8b0ce66a3bf02da0412
-
SHA512
25f84acef952f5827898e3e9e7be0d224319c6ea5659d4cd743aa7c93856b8cbbb90c572432ab65cccf3f8fee5d3b7ba69fdcdf4099628c4500a2310b8577983
-
SSDEEP
1536:xXPIYcBbHPMch5aYKIsIm5JDbOpycVjtvCYQ8nRhBd4RCy8VHyU:f2xZm3OsstvC7khBd4RCtyU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource b0d99d50a36a88ae2093dcadea6d8330_JaffaCakes118
Files
-
b0d99d50a36a88ae2093dcadea6d8330_JaffaCakes118.exe windows:4 windows x86 arch:x86
261474a28e4ee011af3dc76625e03b9e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
InterlockedIncrement
InterlockedDecrement
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
IsValidCodePage
WriteFile
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
GetStringTypeW
LCMapStringA
lstrcmpA
msvcrt
memset
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE