Static task
static1
Behavioral task
behavioral1
Sample
258c5f0ca3e2a0720a257d33b9c96f49_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
258c5f0ca3e2a0720a257d33b9c96f49_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
258c5f0ca3e2a0720a257d33b9c96f49_JaffaCakes118
-
Size
169KB
-
MD5
258c5f0ca3e2a0720a257d33b9c96f49
-
SHA1
fe7c481bd9c77a6349a599cbdddabafd61044465
-
SHA256
c4a911f2fa71822f38d43e78c36cadef7d4d4bc4d1987d565d3e5bc16bc49a7c
-
SHA512
56bf1e7d27534fbdfdbdb94bd3f027f356e4c0dae40b9c5bc573353be1cf474bf2ba2eb1cb78c1715fbfa64e123e5e8a888eef80039432425fcbe78780181ffa
-
SSDEEP
3072:CBydTp5Tgw4v8XTpQVtmP33qJG+LSZ3XKfGjdst7jgK:R5ToUpmmiJbc3XEsnK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 258c5f0ca3e2a0720a257d33b9c96f49_JaffaCakes118
Files
-
258c5f0ca3e2a0720a257d33b9c96f49_JaffaCakes118.exe windows:1 windows x86 arch:x86
0aecb1cedb248d49d1633cb4b59de2c1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_adjust_fdiv
_controlfp
wcsftime
__set_app_type
_wcmdln
_acmdln
_initterm
__p__fmode
_commode
memcpy
_XcptFilter
__getmainargs
_outpd
_mbsncmp
fgetwc
qsort
exit
getchar
_except_handler3
__p__commode
_exit
_findclose
_set_SSE2_enable
__setusermatherr
kernel32
LoadLibraryA
HeapFree
OpenProcess
DuplicateHandle
TerminateProcess
CreateEventW
InterlockedDecrement
IsDebuggerPresent
HeapCreate
HeapAlloc
TlsFree
ExitProcess
GetVersion
LocalAlloc
GetStartupInfoA
Module32Next
GetCurrentThread
GetStdHandle
GetModuleHandleA
ResumeThread
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 155KB - Virtual size: 154KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 126B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ