Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_51de17ec14afffee48d414ca4b0cce2b.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_51de17ec14afffee48d414ca4b0cce2b
-
Size
420KB
-
MD5
51de17ec14afffee48d414ca4b0cce2b
-
SHA1
edb30c7bcf473157d85e3b4028f7e7891a82a531
-
SHA256
860a88ed560387090f024fdd3a706472ddac7260b492aa10495711a12a003e89
-
SHA512
8923e981b30102395518427e3ac3c4a18b7fdaac1dd176af93adf7f237f2eccc21f4d9557075d4b60e3a019308436c47128328564d448bd19e2a69604fdd3455
-
SSDEEP
12288:8oxnd1/Oy5pSHINrWNTxcBNOYRlQJyQiNyp+YIhVk:Vd12IE2gYR7Q2YILk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_51de17ec14afffee48d414ca4b0cce2b
Files
-
JaffaCakes118_51de17ec14afffee48d414ca4b0cce2b.exe windows:4 windows x86 arch:x86
73ec795c6c369c6ce2c3b4c3f6477daa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
lstrcatA
InitializeCriticalSection
GetProcAddress
LocalFree
RaiseException
LocalAlloc
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
DuplicateHandle
GetShortPathNameA
ResumeThread
WriteProcessMemory
GetPrivateProfileSectionA
GetStringTypeA
LCMapStringW
LCMapStringA
RtlUnwind
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
user32
DefWindowProcA
AdjustWindowRectEx
Sections
0 Size: - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1 Size: 207KB - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 46KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: 7KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE