Static task
static1
Behavioral task
behavioral1
Sample
3983c79290fe96e40ddb19b776de6a4d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3983c79290fe96e40ddb19b776de6a4d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3983c79290fe96e40ddb19b776de6a4d_JaffaCakes118
-
Size
995KB
-
MD5
3983c79290fe96e40ddb19b776de6a4d
-
SHA1
60a1be1e5e90a30844df0fdc9610378cca189ebc
-
SHA256
4880bf6a84f5c1a1137a3a79880dd7b77ffb8e3b5dbd64ee03ba834ce3d5d3f1
-
SHA512
54e95a9aaad36dca48bd066625b349e53076aeb4ef467d921269a96e78ef4a3ca09abb52a26b152d305d2ed1ce006fdaf2779cbae2ca702e708da03ec666106d
-
SSDEEP
24576:DAHwUHGL0DD0NZ+x2daVQKG6VBksg4LeSOQF0jWX6HqiJxd:OhmOD0n+IsQKFBLgSKsFif
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3983c79290fe96e40ddb19b776de6a4d_JaffaCakes118
Files
-
3983c79290fe96e40ddb19b776de6a4d_JaffaCakes118.exe windows:4 windows x86 arch:x86
2ff8daa8b51f385e7b24338bce705489
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
CompareFileTime
EnumSystemLocalesW
FindAtomW
DeleteFileW
EndUpdateResourceW
VirtualProtect
ExitProcess
GetDriveTypeW
GetAtomNameW
GetDateFormatW
GetModuleHandleW
Sections
CODE Size: 411KB - Virtual size: 582KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 16B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 536KB - Virtual size: 695KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ