Static task
static1
Behavioral task
behavioral1
Sample
c0c8f28244f50cbcfd46719a7e4d97c0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c0c8f28244f50cbcfd46719a7e4d97c0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c0c8f28244f50cbcfd46719a7e4d97c0_JaffaCakes118
-
Size
108KB
-
MD5
c0c8f28244f50cbcfd46719a7e4d97c0
-
SHA1
bfecb11ea56232561e78c2dfc207e4e2e9449cc6
-
SHA256
32f47e512b1d4831cdcfa4760fe77c85b8bd0eb67bb803a032837c3d91b04869
-
SHA512
500bfd7cb504642eac3683cd052b7c3aab86b5f740a3d9b6b5fe2b00923839533a48640ab41ddde94b2bee6fdee24adced6e71b1f895a2d8760237a170d41fd3
-
SSDEEP
3072:/Lc5wRzKPZy97NiO99PRl6JOtCmJRyO4fuZznGZ:Dc5sgZy97NiO99PRwJOsmJR54fuZa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c0c8f28244f50cbcfd46719a7e4d97c0_JaffaCakes118
Files
-
c0c8f28244f50cbcfd46719a7e4d97c0_JaffaCakes118.exe windows:4 windows x86 arch:x86
9b4064394d5aad6266664bf55b7662e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
AddAtomA
ExitProcess
FindAtomA
GetAtomNameA
SetUnhandledExceptionFilter
msvcrt
_isatty
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_flsbuf
_iob
_onexit
_setmode
abort
atexit
atoi
exit
fclose
fgets
fopen
fprintf
fputs
free
fwrite
malloc
memcpy
memset
printf
putchar
puts
realloc
signal
sprintf
strchr
strcmp
strcpy
strlen
strncmp
strncpy
vfprintf
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 207KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE