Static task
static1
Behavioral task
behavioral1
Sample
19b8fe7055ec34b55371c58eec5a89e7_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
19b8fe7055ec34b55371c58eec5a89e7_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
19b8fe7055ec34b55371c58eec5a89e7_JaffaCakes118
-
Size
108KB
-
MD5
19b8fe7055ec34b55371c58eec5a89e7
-
SHA1
981d4a4b98226c93418515ea86c38e33aea29d5e
-
SHA256
0a761d656fb60980ad4eb9c18d7dd9443e1373bc0307eb0dc8546fbc12592fe9
-
SHA512
6ae12fcb5f3f39138d01fc8739a4855c296edccfda03f14b7c37e87bda6b208b1aa5c4c27a628b65d68811376c1d911e7585efd2c8592acf75924a2053906513
-
SSDEEP
3072:/Lc5wRzKPZy97NiO99PRl6JOtCmJRyO4fuZznGd:Dc5sgZy97NiO99PRwJOsmJR54fuZa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19b8fe7055ec34b55371c58eec5a89e7_JaffaCakes118
Files
-
19b8fe7055ec34b55371c58eec5a89e7_JaffaCakes118.exe windows:4 windows x86 arch:x86
9b4064394d5aad6266664bf55b7662e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
AddAtomA
ExitProcess
FindAtomA
GetAtomNameA
SetUnhandledExceptionFilter
msvcrt
_isatty
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_flsbuf
_iob
_onexit
_setmode
abort
atexit
atoi
exit
fclose
fgets
fopen
fprintf
fputs
free
fwrite
malloc
memcpy
memset
printf
putchar
puts
realloc
signal
sprintf
strchr
strcmp
strcpy
strlen
strncmp
strncpy
vfprintf
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 207KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE