Static task
static1
Behavioral task
behavioral1
Sample
ad3b18d3c5b047928e07672e1d653c1b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ad3b18d3c5b047928e07672e1d653c1b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ad3b18d3c5b047928e07672e1d653c1b_JaffaCakes118
-
Size
1.0MB
-
MD5
ad3b18d3c5b047928e07672e1d653c1b
-
SHA1
ae2423c4826b170373a8b996e264356d9de06573
-
SHA256
8fe6a68281af19673ca873563fa36c1f6e915a3c397fc55899876be1088773df
-
SHA512
c16083826423ca0d4a198afa42238ff4855565291c1bf9a0720c0ce1b384458fbb0e5cb566dc7454b77f1f04c1c8eb4ac2d789e152474d4fca68729830469cdd
-
SSDEEP
3072:4uRg1+dyD46Kj+i3DKzGD687viHBiMnA/0vbQKTnblH30WflPeOyvFIell04GS:nBYD46Vi32zGDvMA/0jpkWflP/y/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad3b18d3c5b047928e07672e1d653c1b_JaffaCakes118
Files
-
ad3b18d3c5b047928e07672e1d653c1b_JaffaCakes118.exe windows:4 windows x86 arch:x86
1c372311534116eeffdf56f3f6c69c5c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
LoadLibraryA
ExitProcess
GetProcAddress
user32
wsprintfA
MessageBoxA
Sections
CODE Size: 157KB - Virtual size: 348KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 2KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 887KB - Virtual size: 908KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nPack Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE