Static task
static1
Behavioral task
behavioral1
Sample
3a725d0f94dbfff3fc3153891c19a8e9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3a725d0f94dbfff3fc3153891c19a8e9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3a725d0f94dbfff3fc3153891c19a8e9_JaffaCakes118
-
Size
88KB
-
MD5
3a725d0f94dbfff3fc3153891c19a8e9
-
SHA1
b9e82f9cae914f8daaf76e7f8f976953cb9f5aba
-
SHA256
1291e9b249d1f65c6694602cb6d9dbe22fb783684ff63d31272c6f7e02c4d835
-
SHA512
5d4c76006e36e0960f8887a74c6a0ecd10ef783eb3faca93d34a0867e799085f34c080e07630fd80a78aa5b589daa2bd191913c3b87badccf7cd5463710dc2bf
-
SSDEEP
1536:1t0HaKmmkw4vGDTlhlLD/bfxjQOAPFhWYTNRPSqvy35ntvmqrGcW02+X4k:v0HaOkGNzbfxjQOEhWYTNRNtqKcw+ok
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a725d0f94dbfff3fc3153891c19a8e9_JaffaCakes118
Files
-
3a725d0f94dbfff3fc3153891c19a8e9_JaffaCakes118.exe windows:4 windows x86 arch:x86
6ca5a719ceaea3d11dec833ad3633775
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord860
ord6648
ord5856
ord6663
ord941
ord2614
ord540
ord800
ord823
ord2915
ord825
msvcrt
??1type_info@@UAE@XZ
_exit
_except_handler3
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_CxxThrowException
strncpy
atoi
__CxxFrameHandler
sprintf
rand
strstr
srand
_XcptFilter
_strlwr
_stricmp
_strrev
kernel32
LoadLibraryA
GetProcAddress
CreateThread
CreateDirectoryA
GetCommandLineA
GetModuleHandleA
GetStartupInfoA
Sleep
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ