Static task
static1
Behavioral task
behavioral1
Sample
76081c6a6b58be6a86608b07ebdf6c0c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
76081c6a6b58be6a86608b07ebdf6c0c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
76081c6a6b58be6a86608b07ebdf6c0c_JaffaCakes118
-
Size
1.4MB
-
MD5
76081c6a6b58be6a86608b07ebdf6c0c
-
SHA1
0f262654c70dece30988ef09b7693e4af8c0a7cd
-
SHA256
f624315fc3a9c7d14f26b7b212be55ed0a50745f8eb0b26f4e1a046b9d8b3832
-
SHA512
c0bd51e7f3e0706b5736c066544fcb03294a0c73ca5b8ac62dc151d101854722690b0aee2bb28cce1fcbc6c6ab57c0a6bee6494619e6d7c5aa8d699da97448bc
-
SSDEEP
24576:vDVBNrjyx6fNNjM8Wt59aa91wU5ynP6r0nEfGfUP2+RmtFSoDnIO9x:vDVfeoII57nfbtF39x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 76081c6a6b58be6a86608b07ebdf6c0c_JaffaCakes118
Files
-
76081c6a6b58be6a86608b07ebdf6c0c_JaffaCakes118.exe windows:4 windows x86 arch:x86
1c372311534116eeffdf56f3f6c69c5c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
LoadLibraryA
ExitProcess
GetProcAddress
user32
wsprintfA
MessageBoxA
Sections
CODE Size: 427KB - Virtual size: 952KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 6KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 8KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.0MB - Virtual size: 14.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nPack Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE