Static task
static1
Behavioral task
behavioral1
Sample
a36184f5d10fc8f64c093c11e35b111a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a36184f5d10fc8f64c093c11e35b111a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a36184f5d10fc8f64c093c11e35b111a_JaffaCakes118
-
Size
347KB
-
MD5
a36184f5d10fc8f64c093c11e35b111a
-
SHA1
d10be386f3ccf10e4675343c92083a1742e4f46d
-
SHA256
2dfbe15a8981fa361dc9ca265753c68c5387341799ecba819439cbc3f1e042da
-
SHA512
3c4f645a101c9367a4cc8d459b18b35cd5875a3ac3af33bd414cc157347f5d9cc8e94b7556d45f1f0a73566e973b60d2937cc028e06bcbaade55b6bd697e904a
-
SSDEEP
6144:ihWZyaBiSTQf4l/AY+XORHZ5mrLte+Gtt8eq5mb4c:i8wWiqQf2/AYb55mey
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a36184f5d10fc8f64c093c11e35b111a_JaffaCakes118
Files
-
a36184f5d10fc8f64c093c11e35b111a_JaffaCakes118.exe windows:4 windows x86 arch:x86
3c0e70bfa5f73f1f1cef484e2bcb5bf8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetModuleHandleA
user32
MessageBoxA
Sections
CODE Size: 269KB - Virtual size: 548KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 38KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE