Static task
static1
Behavioral task
behavioral1
Sample
be97e938a93cba008006b35177ac029c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
be97e938a93cba008006b35177ac029c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
be97e938a93cba008006b35177ac029c_JaffaCakes118
-
Size
284KB
-
MD5
be97e938a93cba008006b35177ac029c
-
SHA1
5d37d0a519d91ba0fef15f6b590d189dbf04ea3d
-
SHA256
5949ad0c1976127260eb27140e205943641bc7d9933cad5ee53aecb3ed923bf4
-
SHA512
a9397563343f28807de0a7e88a4814518622519865104c42faebe27c09b74e1ae3cf318bd69a96f321b95a84170fa8c28138f961d2e76c472b2021ee182b1645
-
SSDEEP
6144:6AAyfV6hY2rp/flrXnEOdCQ/21KH5+rSMQ0Q2q:bAcar1nlTPdCQ/bHkrSv/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource be97e938a93cba008006b35177ac029c_JaffaCakes118
Files
-
be97e938a93cba008006b35177ac029c_JaffaCakes118.exe windows:4 windows x86 arch:x86
3c0e70bfa5f73f1f1cef484e2bcb5bf8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetModuleHandleA
user32
MessageBoxA
Sections
CODE Size: 226KB - Virtual size: 468KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE