Static task
static1
Behavioral task
behavioral1
Sample
6747036a6275da4f2fcb17d4c4f8b30e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6747036a6275da4f2fcb17d4c4f8b30e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6747036a6275da4f2fcb17d4c4f8b30e_JaffaCakes118
-
Size
98KB
-
MD5
6747036a6275da4f2fcb17d4c4f8b30e
-
SHA1
5239c04fa063e414cfc252e41c93404ef9993de1
-
SHA256
a3d69e367f975cccda49c5f72b772f6809c661b925f279586f8fd4cd523f5ab0
-
SHA512
3fd68adfbdef2097a1c6f9a20060b31092915aee58fb870f97ebd778c32d4e879d95b1efbe5d77a6c6379b07a187bdfc27d69bffaca2413094c50216f4094b49
-
SSDEEP
3072:e8v4ZsrV5egdLp+K7X9dzp/qSmnMe9dhHmI:eGS4tLwKTfYv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6747036a6275da4f2fcb17d4c4f8b30e_JaffaCakes118
Files
-
6747036a6275da4f2fcb17d4c4f8b30e_JaffaCakes118.exe windows:4 windows x86 arch:x86
db12b2078c2aafd54052d0e3ff6a81c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
LoadLibraryA
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
MessageBoxA
MessageBoxA
comctl32
InitCommonControls
msvcr80
_adjust_fdiv
Sections
Size: - Virtual size: 44KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ddata0 Size: 1024B - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ddata1 Size: - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_WRITE
.ddata2 Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ