Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6f857be5377a7543858aacefea6f1a30.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6f857be5377a7543858aacefea6f1a30.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6f857be5377a7543858aacefea6f1a30
-
Size
125KB
-
MD5
6f857be5377a7543858aacefea6f1a30
-
SHA1
4cb339a3f00fd74ecb76f3445382508178969846
-
SHA256
9e91f864813ec868a3c06fb356580978d6a648c0fdcb0333ed14bee11bc29d97
-
SHA512
e1b47cf97413c48e6b22e4fcb72132e4f2cc4002b442b97a2973b5686b112107223c2503550239da5f0becb643eaa1776ed3747097b3300d02b87a324fa28afc
-
SSDEEP
3072:8rFMrpkj8RLr+PCRUqsMlKaFZ5KrCgb0Nli:8pikjqnlE0Fq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_6f857be5377a7543858aacefea6f1a30
Files
-
JaffaCakes118_6f857be5377a7543858aacefea6f1a30.exe windows:4 windows x86 arch:x86
f7fe0154b2dc017e686b8cc1adb18619
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenW
lstrcpyW
SetConsoleTitleA
GetLocaleInfoA
GetProcessHeap
DeleteFileA
lstrcpyW
GetModuleFileNameA
IsBadStringPtrA
lstrcpyW
GetModuleHandleA
CreateEventA
FindFirstVolumeA
SetCurrentDirectoryA
GetStartupInfoW
GetStdHandle
SetLastError
FindNextVolumeA
VirtualAllocEx
GetVolumePathNameW
lstrcpyW
IsValidLocale
lstrcpyW
untfs
Format
ChkdskEx
Extend
Recover
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RData Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Adata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ