Static task
static1
Behavioral task
behavioral1
Sample
4c2f3561585a2475c4dfe7fdc684ac33_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4c2f3561585a2475c4dfe7fdc684ac33_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4c2f3561585a2475c4dfe7fdc684ac33_JaffaCakes118
-
Size
1.2MB
-
MD5
4c2f3561585a2475c4dfe7fdc684ac33
-
SHA1
9a1333ae0e49e990ee081098f7acf7f4535bc1a2
-
SHA256
f8f240427921da2dca05961f755ae1aaf51fe97fe8c5a4638a009d906f4466ba
-
SHA512
34733bb07f3198a1f745548450a3617e57719a333024d2ca09929343b51b50abe0fb77633ecde2c94eaeb06af79a3d5b741c0e7caa2d825962075cf971f91d97
-
SSDEEP
24576:EPoKeTuw/wMSNtj5C90TiuUw0F7uqkDtQn:E2foMS/MmTinw6uqku
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c2f3561585a2475c4dfe7fdc684ac33_JaffaCakes118
Files
-
4c2f3561585a2475c4dfe7fdc684ac33_JaffaCakes118.exe windows:4 windows x86 arch:x86
820ab24e53af2dbafc74d24f87e40262
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
user32
MessageBoxA
comctl32
InitCommonControls
kernel32
LoadLibraryA
GetProcAddress
Sections
Size: 323KB - Virtual size: 704KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 848KB - Virtual size: 15.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE