Static task
static1
Behavioral task
behavioral1
Sample
4bb87959e28df01dc113e2bc22968334_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4bb87959e28df01dc113e2bc22968334_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4bb87959e28df01dc113e2bc22968334_JaffaCakes118
-
Size
159KB
-
MD5
4bb87959e28df01dc113e2bc22968334
-
SHA1
adec5c41a8d5579650ba2cab2a74b254ca4a49d8
-
SHA256
766258a3f0e70f14b4e0578341112ec704e40f07afddb93c8f0b36ea2ab9b095
-
SHA512
5029c9ee6840adaed9a676f1f36cabb1b14ca94ce0a2af866fdc989864a24e125a7ba04330ca86b9f521b9f7dccdb54c4fe5198afeb68de3f08e2dffa6110131
-
SSDEEP
3072:/6vPgm38nunfOwn12UrQBXeGPnDlf/fkFWWHHFt1ycTG6:/CPZIundXOBPDp/fIWWnFR66
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4bb87959e28df01dc113e2bc22968334_JaffaCakes118
Files
-
4bb87959e28df01dc113e2bc22968334_JaffaCakes118.exe windows:4 windows x86 arch:x86
ee83ad8e93e8f9f96941fa443cf706da
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
cygwin1
__errno
__getreent
__main
_ctype_
_fchown32
_fdopen64
_fopen64
_impure_ptr
_lstat64
_open64
_stat64
calloc
close
cygwin_internal
dll_crt0__FP11per_process
exit
fchmod
fclose
fflush
fgetc
fileno
fprintf
fputc
fread
free
fwrite
getenv
isatty
malloc
perror
realloc
remove
rewind
setmode
signal
strcat
strcmp
strcpy
strerror
strlen
strncpy
strstr
ungetc
utime
kernel32
GetModuleHandleA
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 81KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE