Static task
static1
Behavioral task
behavioral1
Sample
eb8570ed8f0a55b392b746a37cbd48c1_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eb8570ed8f0a55b392b746a37cbd48c1_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
eb8570ed8f0a55b392b746a37cbd48c1_JaffaCakes118
-
Size
7KB
-
MD5
eb8570ed8f0a55b392b746a37cbd48c1
-
SHA1
d5830dc817ab312a4173254076c6b91847210eaf
-
SHA256
fb849bdb595c8badbae3eb7538cfa83fd7bec35b6e6654596afe3d173b0ea1a4
-
SHA512
d27cfddd44caca4cd9ede9503da403384304ab1b25a4507c4c67bb48b66818ec7cf242bd40bd996d56438bf28c1ec08e674a5712c55349cb247f20d6d49a8554
-
SSDEEP
96:OQPHThfnYicc/N/vygkMrZ+gU46QqqbbuFBOfmM0:1PHT9RcY/vygkgbb8BOfm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb8570ed8f0a55b392b746a37cbd48c1_JaffaCakes118
Files
-
eb8570ed8f0a55b392b746a37cbd48c1_JaffaCakes118.exe windows:4 windows x86 arch:x86
9a6544ca2a08dfc80ca49ec69e11d350
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
AddAtomA
CloseHandle
CreateFileA
ExitProcess
FindAtomA
GetAtomNameA
GetCommandLineA
GetModuleHandleA
GetStartupInfoA
SetUnhandledExceptionFilter
WriteFile
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
fflush
fprintf
free
malloc
rename
signal
shell32
ShellExecuteA
user32
DefWindowProcA
PostQuitMessage
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 368B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 176B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE