Static task
static1
Behavioral task
behavioral1
Sample
0eb5f8e622f823e3b7706d92a8693fd3_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0eb5f8e622f823e3b7706d92a8693fd3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0eb5f8e622f823e3b7706d92a8693fd3_JaffaCakes118
-
Size
2.6MB
-
MD5
0eb5f8e622f823e3b7706d92a8693fd3
-
SHA1
a609995a2de90f0a7d06482f15081bf794b7e439
-
SHA256
c63fb5fced89f21f6e9a70eccc75fa3563cf4f97a7e19b2e330d1e88e1215f1a
-
SHA512
8efc1bef54bf107d64ed470a71d78c739f64410c6aa52a8d5c40b665d897abf779d8303a8fe5e190582515d324820329db7ed47da2aa4391fbb4c0998807bf8e
-
SSDEEP
49152:b52asMLERud0L8tO3Y2A8kbAl+ZIDiavOOF+dokNIihWp3xgRLFTD9f74:b52as2ERudu8t9AkbAEZI2y8YBtu/NfE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0eb5f8e622f823e3b7706d92a8693fd3_JaffaCakes118
Files
-
0eb5f8e622f823e3b7706d92a8693fd3_JaffaCakes118.exe windows:4 windows x86 arch:x86
de39dc68941cc6307e3b2590c857a907
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
user32
wsprintfA
advapi32
RegCloseKey
ole32
OleRun
Sections
.text Size: 1.8MB - Virtual size: 4.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 53KB - Virtual size: 136.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.LibHook Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.LibHook Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.LibHook Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.adata Size: 75KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE