Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_50bfc970f45b54738e96482b53f9c1ea.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_50bfc970f45b54738e96482b53f9c1ea.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_50bfc970f45b54738e96482b53f9c1ea
-
Size
37KB
-
MD5
50bfc970f45b54738e96482b53f9c1ea
-
SHA1
f161201ad0993a023784043e02e7b7e0495dccbe
-
SHA256
60934a917f9172865d9a506f3560649f60080a4d9c8ec93b0ac4572a5d188a19
-
SHA512
e33cf74336c546312d7b65f0c282d4d917e222a83f8d5bbe29a73d885024f2b09396df653c0e0168f95b04432eea6281f9f424057669d57d543d46559db6340f
-
SSDEEP
768:OCM8PZagvgrApjA/vQsRj+N//pUESf9t84FIILs:rjBbjA3QUiN3pUE49tPlw
Malware Config
Signatures
Files
-
JaffaCakes118_50bfc970f45b54738e96482b53f9c1ea.exe windows:4 windows x86 arch:x86
6ca8bd7640ef117bb8f332811e882947
Code Sign
b6:df:39:29:9c:b5:3b:4f:e4:35:df:ef:85:fc:cc:96:cd:ad:e3:1eSigner
Actual PE Digestb6:df:39:29:9c:b5:3b:4f:e4:35:df:ef:85:fc:cc:96:cd:ad:e3:1eDigest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
GetProcAddress
LoadLibraryA
GetCurrentThread
VirtualProtect
LockResource
LoadResource
GetCurrentThreadId
FindResourceA
LocalFree
CreateEventA
GetWindowsDirectoryA
ResumeThread
MapViewOfFile
CreateFileMappingA
GetStdHandle
CreateFileA
GetFileSize
LocalAlloc
ExitThread
user32
GetWindow
GetActiveWindow
ntdll
LdrFindEntryForAddress
LdrGetDllHandleEx
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 770B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ