Static task
static1
Behavioral task
behavioral1
Sample
4a0520a68e051a7f682a1c888a237519_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4a0520a68e051a7f682a1c888a237519_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4a0520a68e051a7f682a1c888a237519_JaffaCakes118
-
Size
151KB
-
MD5
4a0520a68e051a7f682a1c888a237519
-
SHA1
012ec51acf87af226511ea717310e2de4f1c46a1
-
SHA256
32727f1649d8b928961ccea71cc8aebdb56b7a423b9608865596c16921400572
-
SHA512
f8017b5ec10ab4ffe7d78ab062ab6e77bc330b40fcd80c95294776f4368a9e7bc6ed948b517e47c4cb5aad103ff37bd6928be9831cb87682a4508b5efd2990ad
-
SSDEEP
3072:H6vPgm38nunfOwn12UrQBqSycnCWsl6aKhiay3OODjYXRk:HCPZIundXqC/l0yeODjp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a0520a68e051a7f682a1c888a237519_JaffaCakes118
Files
-
4a0520a68e051a7f682a1c888a237519_JaffaCakes118.exe windows:4 windows x86 arch:x86
ee83ad8e93e8f9f96941fa443cf706da
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
cygwin1
__errno
__getreent
__main
_ctype_
_fchown32
_fdopen64
_fopen64
_impure_ptr
_lstat64
_open64
_stat64
calloc
close
cygwin_internal
dll_crt0__FP11per_process
exit
fchmod
fclose
fflush
fgetc
fileno
fprintf
fputc
fread
free
fwrite
getenv
isatty
malloc
perror
realloc
remove
rewind
setmode
signal
strcat
strcmp
strcpy
strerror
strlen
strncpy
strstr
ungetc
utime
kernel32
GetModuleHandleA
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 73KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE