Static task
static1
Behavioral task
behavioral1
Sample
26bac461defd79b5890538dc52e9ebe9_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
26bac461defd79b5890538dc52e9ebe9_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
26bac461defd79b5890538dc52e9ebe9_JaffaCakes118
-
Size
214KB
-
MD5
26bac461defd79b5890538dc52e9ebe9
-
SHA1
f4fb1a8b1b540ca0da7af3a9aa390e6d6023ed1a
-
SHA256
5775ec438c804aa5de77872a6df1db1273690271044eb61147f66924cbf98565
-
SHA512
cb1c7ca6d97c910ab4a41035822676cc2d41a84bb662ea07d6a4a9875267a082aa9f2032b7883cf4e545f9d601b9b1c4d2445e72a79ca3347c2e4c3366dc24f2
-
SSDEEP
6144:KAtHMQk2SX8zXfxEJ2YDPL9tqHZX4ngVvw:KAtHhrSMqJjLDoZX4ngV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 26bac461defd79b5890538dc52e9ebe9_JaffaCakes118
Files
-
26bac461defd79b5890538dc52e9ebe9_JaffaCakes118.exe windows:4 windows x86 arch:x86
820ab24e53af2dbafc74d24f87e40262
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
user32
MessageBoxA
comctl32
InitCommonControls
kernel32
LoadLibraryA
GetProcAddress
Sections
Size: 166KB - Virtual size: 328KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE