Static task
static1
Behavioral task
behavioral1
Sample
b7455b27385d57007a1a024f2e2ac974_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b7455b27385d57007a1a024f2e2ac974_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b7455b27385d57007a1a024f2e2ac974_JaffaCakes118
-
Size
471KB
-
MD5
b7455b27385d57007a1a024f2e2ac974
-
SHA1
d01ce0f6fc6cfcbe379fe09bff4d070cde36a959
-
SHA256
69e3e0b647ff752c195cedb0be07d1c573cb3e4838832a0566013100ebad52d5
-
SHA512
d462418d67da63233183d5ee45019c292d118c1b2f2a04fd09730450bb1d589bb8ae80f64ddcfc5366204e8cd5554ef626424248932bb7067688a66b5b6edb4f
-
SSDEEP
6144:sbdD/8Vhod3iPPyvhfSI47nfZgHcCBki92jHZiWXZXOyAipmfwjEPAdF4O:sbR/KySCvhf9eaHcCBkO2jHBxpm4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7455b27385d57007a1a024f2e2ac974_JaffaCakes118
Files
-
b7455b27385d57007a1a024f2e2ac974_JaffaCakes118.exe windows:4 windows x86 arch:x86
819ddf1b48c69951a0fcc4ff9acab219
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
cygwin1
__argz_count
__argz_next
__argz_stringify
__assert
__errno
__getreent
__main
_ctype_
_exit
_fcntl64
_fdopen64
_fopen64
_fseeko64
_fstat64
_ftello64
_getegid32
_geteuid32
_getgid32
_getuid32
_impure_ptr
_lstat64
_open64
_stat64
abort
atoi
bsearch
calloc
chmod
close
ctime
cygwin_conv_to_win32_path
cygwin_internal
dll_crt0__FP11per_process
exit
fclose
fflush
fgets
fileno
fprintf
fputc
fputs
fread
free
fwrite
getcwd
getenv
malloc
memchr
memcpy
memmove
mempcpy
memset
printf
pthread_atfork
pthread_create
pthread_getspecific
pthread_key_create
pthread_mutex_lock
pthread_mutex_unlock
pthread_once
pthread_setspecific
putc
qsort
raise
read
realloc
snprintf
sprintf
strcasecmp
strcat
strchr
strcmp
strcpy
strerror
strlen
strncasecmp
strncpy
strrchr
strstr
strtol
strtoul
tfind
time
tsearch
umask
unlink
vfprintf
vprintf
vsprintf
kernel32
AddAtomA
CloseHandle
ContinueDebugEvent
DebugActiveProcess
FindAtomA
GetAtomNameA
GetLastError
GetModuleHandleA
GetProcAddress
GetThreadContext
LoadLibraryA
OpenEventA
OpenProcess
ReadProcessMemory
SetEvent
VirtualQueryEx
WaitForDebugEvent
Sections
.text Size: 373KB - Virtual size: 372KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 33KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 27KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE