Static task
static1
Behavioral task
behavioral1
Sample
ac06092cc30e127bb07a3dddb0513d74_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ac06092cc30e127bb07a3dddb0513d74_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ac06092cc30e127bb07a3dddb0513d74_JaffaCakes118
-
Size
491KB
-
MD5
ac06092cc30e127bb07a3dddb0513d74
-
SHA1
f4e9be97337f9c1d63a2aa1c49c9495a58933986
-
SHA256
efce3bc48a98972c873ddf7cbb0b85e8a5eb274dacce0252a49bb46214eaaa97
-
SHA512
1bf09d307b4a27cfaf670452c6ed3fb78b14f666f3859918190eb88456af127509bf7ba441fc4ca74c27f664746bb3bfb4a397766084f708f53a435aa7537803
-
SSDEEP
6144:0bdD/8Vhod3iPPyvhfSI47nfZgHcCBki92jHZiWXZXOyAipmfwjEPActQOS:0bR/KySCvhf9eaHcCBkO2jHBxpm4y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac06092cc30e127bb07a3dddb0513d74_JaffaCakes118
Files
-
ac06092cc30e127bb07a3dddb0513d74_JaffaCakes118.exe windows:4 windows x86 arch:x86
819ddf1b48c69951a0fcc4ff9acab219
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
cygwin1
__argz_count
__argz_next
__argz_stringify
__assert
__errno
__getreent
__main
_ctype_
_exit
_fcntl64
_fdopen64
_fopen64
_fseeko64
_fstat64
_ftello64
_getegid32
_geteuid32
_getgid32
_getuid32
_impure_ptr
_lstat64
_open64
_stat64
abort
atoi
bsearch
calloc
chmod
close
ctime
cygwin_conv_to_win32_path
cygwin_internal
dll_crt0__FP11per_process
exit
fclose
fflush
fgets
fileno
fprintf
fputc
fputs
fread
free
fwrite
getcwd
getenv
malloc
memchr
memcpy
memmove
mempcpy
memset
printf
pthread_atfork
pthread_create
pthread_getspecific
pthread_key_create
pthread_mutex_lock
pthread_mutex_unlock
pthread_once
pthread_setspecific
putc
qsort
raise
read
realloc
snprintf
sprintf
strcasecmp
strcat
strchr
strcmp
strcpy
strerror
strlen
strncasecmp
strncpy
strrchr
strstr
strtol
strtoul
tfind
time
tsearch
umask
unlink
vfprintf
vprintf
vsprintf
kernel32
AddAtomA
CloseHandle
ContinueDebugEvent
DebugActiveProcess
FindAtomA
GetAtomNameA
GetLastError
GetModuleHandleA
GetProcAddress
GetThreadContext
LoadLibraryA
OpenEventA
OpenProcess
ReadProcessMemory
SetEvent
VirtualQueryEx
WaitForDebugEvent
Sections
.text Size: 373KB - Virtual size: 372KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 33KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 39KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE