Static task
static1
Behavioral task
behavioral1
Sample
3d9798856fd37d9e88b202560d741a53_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3d9798856fd37d9e88b202560d741a53_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3d9798856fd37d9e88b202560d741a53_JaffaCakes118
-
Size
29KB
-
MD5
3d9798856fd37d9e88b202560d741a53
-
SHA1
4d80e7b303360db30e9702e24924621bc6877642
-
SHA256
f40edd2a8caccd17ab55195e5efc7f23f217d34fb4c3cd633f52fbc683e39f5e
-
SHA512
fc878e1a7952dda241d35da1d86e7cb145e779740909c42dd3e7f70874804a0a64e7dbcac23e8ff8127fc4cd5360be0298590ba50eca458ce215c872be9b7478
-
SSDEEP
192:z0VSl+M58aOHtdFP1oynEChlxZTANZPR/A9Ryrn7Ii:wILgx1yCjx4ZJY9Urn7Ii
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d9798856fd37d9e88b202560d741a53_JaffaCakes118
Files
-
3d9798856fd37d9e88b202560d741a53_JaffaCakes118.exe windows:4 windows x86 arch:x86
57ad23ab29fc6a8e0efe22811c5805a5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleA
SizeofResource
LockResource
LoadResource
FindResourceA
LoadLibraryA
GetModuleFileNameA
GetStartupInfoA
msvcrt
strtok
_exit
_XcptFilter
exit
??2@YAPAXI@Z
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
__dllonexit
_onexit
_acmdln
Sections
.rdata Size: 512B - Virtual size: 270B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 350B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.Tesla Size: 617B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE