Static task
static1
Behavioral task
behavioral1
Sample
ebb01d71dd377a66b110f5a8ec66c056_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ebb01d71dd377a66b110f5a8ec66c056_JaffaCakes118.exe
Resource
win10v2004-20240319-en
General
-
Target
ebb01d71dd377a66b110f5a8ec66c056_JaffaCakes118
-
Size
74KB
-
MD5
ebb01d71dd377a66b110f5a8ec66c056
-
SHA1
209fad27661935c1bf0fc6cdd2e5d0eb05dd3e92
-
SHA256
b7db20cba99f48903823b796443648395d281c0691d94571d2d6f0b22a49b6f8
-
SHA512
76c9d6ee45fa452f4e5b26e732c6718001e04d9e73755422f9ced02579223bc6cbb97972f8f49f68e671a386cfe0a8645f0d9a2c011e24a59f2b3c5d604e257f
-
SSDEEP
1536:HWMGJkNhliM+AQUobaY+lm1V057DcnZW294Or07/oCKoUAT9SBT:HWMmsiodyH/z057DcZjOOriKgA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ebb01d71dd377a66b110f5a8ec66c056_JaffaCakes118
Files
-
ebb01d71dd377a66b110f5a8ec66c056_JaffaCakes118.exe windows:4 windows x86 arch:x86
d5e0355f8764c235b38759b860077ceb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleA
LoadLibraryA
user32
MessageBoxA
Sections
.tls Size: 45KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 11KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rcdata Size: 1KB - Virtual size: 5.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dotfix Size: 2KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE