Static task
static1
Behavioral task
behavioral1
Sample
308fb38e195b6b4b2a4f040ebb393e54_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
308fb38e195b6b4b2a4f040ebb393e54_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
308fb38e195b6b4b2a4f040ebb393e54_JaffaCakes118
-
Size
200KB
-
MD5
308fb38e195b6b4b2a4f040ebb393e54
-
SHA1
64b17881ae93cce71cc8bac3977470eb438bfb0c
-
SHA256
d3c231f65277c44f7e9c83f85c4ec95dec722a627fa03b3d35d80e0768e9f01a
-
SHA512
47b306d2b1eaeb34645b9d0ffe6e1449da72a04d0aacd2fcead3459124f899d92e2afb42291e6d4dea58379f6561d53005658c247cdc85e75de5b90259ab4931
-
SSDEEP
6144:Trx7ueVf6L5BRwdqe82gm1zds1OlkxmupH54w:T97pVkGvLuOlk8upZ4w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 308fb38e195b6b4b2a4f040ebb393e54_JaffaCakes118
Files
-
308fb38e195b6b4b2a4f040ebb393e54_JaffaCakes118.exe windows:4 windows x86 arch:x86
f433e7fcc51e68080022754836705744
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
VirtualAlloc
VirtualFree
user32
MessageBoxA
Sections
.text Size: - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ootkravu Size: - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4xz.w5a3 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
oeewjmsl Size: - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tkwnhqw2 Size: 195KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE