Static task
static1
Behavioral task
behavioral1
Sample
0ef2c1f9e0f0eff2b71d7b3206c21c33_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0ef2c1f9e0f0eff2b71d7b3206c21c33_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0ef2c1f9e0f0eff2b71d7b3206c21c33_JaffaCakes118
-
Size
312KB
-
MD5
0ef2c1f9e0f0eff2b71d7b3206c21c33
-
SHA1
4bed75f692f53740a08be3d7a6940ce8532ff03f
-
SHA256
be9028251dbabe0fd42e05de74e35cb0da08732750aa9fd1559d6f77f34d686a
-
SHA512
0d32f66780c9dcc17ee9a3d7e98b51988860554acf905f5565d5e6916e56cb5cac39efd856474c2dfc8726086793feb01f3e9c95fbb1295bfa62aa2e6a4e450f
-
SSDEEP
6144:EsGypJqt9VlYF6BwdM5LZKKCVCaU8FR8h4dAMmg1CsKJmJMuYDaJHzpJUA2I:EsFCt9Ltr5tKKIV+hjg6uWaJ1SAT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ef2c1f9e0f0eff2b71d7b3206c21c33_JaffaCakes118
Files
-
0ef2c1f9e0f0eff2b71d7b3206c21c33_JaffaCakes118.exe windows:4 windows x86 arch:x86
98ba0eaaf18820847921e45416d79ab8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
GetProcessHeap
GetModuleFileNameA
GetVersionExA
FreeEnvironmentStringsW
MulDiv
MultiByteToWideChar
CreateFileW
CreateFileMappingA
GetFileSize
GetStdHandle
GetCommandLineA
GetCurrentThread
GetModuleHandleA
GetCurrentThreadId
GetVersion
GetLastError
GetTickCount
GetCurrentProcessId
ExitProcess
HeapAlloc
GetStartupInfoA
msvcrt
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_exit
_strcmpi
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 292KB - Virtual size: 288KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ