Static task
static1
Behavioral task
behavioral1
Sample
a875e0cbb37d1911ff9833a56872213a_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a875e0cbb37d1911ff9833a56872213a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a875e0cbb37d1911ff9833a56872213a_JaffaCakes118
-
Size
128KB
-
MD5
a875e0cbb37d1911ff9833a56872213a
-
SHA1
bfcaffc1410900876f171a4f166fb87eddef4c52
-
SHA256
6a4af47912ab5f5b096208da400b749b753f42e44bbcc54eea4055b247542a42
-
SHA512
9a64c49dcc0d716e0451087fb29b022a076244192e415dabb95fbda4e36c8342164a063a8328d79ea2e3d121de62d27b18ba397a6d314c9dff6e133414145164
-
SSDEEP
3072:V5wkhcI9CqZcJkl/1bxb86ey29DAUMMLXvOy9Md9L:V5wiV9Cqh/1bHRUMQgh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a875e0cbb37d1911ff9833a56872213a_JaffaCakes118
Files
-
a875e0cbb37d1911ff9833a56872213a_JaffaCakes118.exe windows:4 windows x86 arch:x86
88dab687fa9ee860bc2c24b861c5e8b6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
kernel32
GetStartupInfoA
LoadLibraryA
VirtualProtect
GetModuleFileNameA
user32
SystemParametersInfoA
MessageBoxA
advapi32
RegQueryValueExA
shell32
SHGetSpecialFolderPathA
imm32
ImmInstallIMEA
Sections
.text Size: - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dsf0 Size: - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_WRITE
.dsf1 Size: 116KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 152B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ