Static task
static1
Behavioral task
behavioral1
Sample
b0965f002844adc48855a22bfd7dea9b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b0965f002844adc48855a22bfd7dea9b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b0965f002844adc48855a22bfd7dea9b_JaffaCakes118
-
Size
20KB
-
MD5
b0965f002844adc48855a22bfd7dea9b
-
SHA1
19ddf88360a11300f053c4b9b065121d3d1715cc
-
SHA256
4bbc8ab990e5e903f6d14ea0214ac83a78c8790ebeb9f65024971b5cf715e306
-
SHA512
7bd0925044cc0c0eb6ea35190d06b5817aa79632ac2ed0f470640989935bbf827785d26dd503698064375257e88a953a4e22c9cbdea8b59802c784e5bbc4e6a4
-
SSDEEP
192:ScHU88tCkOZCZBfyrnWa+VrTFu9vD6vEFhI0KCMF0:5uiCZBq7NcTF8vWMnlxH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b0965f002844adc48855a22bfd7dea9b_JaffaCakes118
Files
-
b0965f002844adc48855a22bfd7dea9b_JaffaCakes118.exe windows:4 windows x86 arch:x86
fb0eeeafe65937e5938c5be1451bb93e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
AddAtomA
ExitProcess
FindAtomA
GetAtomNameA
GetCommandLineA
GetModuleHandleA
GetStartupInfoA
SetUnhandledExceptionFilter
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
fflush
fprintf
free
malloc
signal
user32
CreateWindowExA
DefWindowProcA
DispatchMessageA
GetMessageA
LoadCursorA
LoadIconA
PostQuitMessage
RegisterClassExA
ShowWindow
TranslateMessage
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 240B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 176B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE