Static task
static1
Behavioral task
behavioral1
Sample
fec411a009431ae4366b45b7c42b5b70_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fec411a009431ae4366b45b7c42b5b70_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fec411a009431ae4366b45b7c42b5b70_JaffaCakes118
-
Size
102KB
-
MD5
fec411a009431ae4366b45b7c42b5b70
-
SHA1
29e6065cb9acba7c2852a89eacb048f1ed082980
-
SHA256
47edce0eea26540e66d21386d300d6138bc9921f69e633110736c6fbb21f8633
-
SHA512
f2bbdaac2654b7e9f62d8e43315358ee163d7f4b2d1b3d052b12091541402169469d917de94a4a77b5970b6d655fca11fbb41c4fe40fbcff3b79a504bbd9f88b
-
SSDEEP
1536:wuPCLRQ52GLNkdw+aTkIaoAFsvEAghoMreyza42B/0fal52AwKp+K6:MC5xkw5vjghoMrVza4RC2ALp+N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fec411a009431ae4366b45b7c42b5b70_JaffaCakes118
Files
-
fec411a009431ae4366b45b7c42b5b70_JaffaCakes118.exe windows:4 windows x86 arch:x86
1702868b0f41259d12ede3145afa3dab
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
AddAtomA
ExitProcess
FindAtomA
GetAtomNameA
GetFullPathNameA
GetVolumeInformationA
SetUnhandledExceptionFilter
msvcrt
_setmode
_strlwr
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
free
fwrite
malloc
memset
signal
strchr
strlen
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 224B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE