Static task
static1
Behavioral task
behavioral1
Sample
ce23cc41cc9a2751847a0e2a26e61d45_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ce23cc41cc9a2751847a0e2a26e61d45_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ce23cc41cc9a2751847a0e2a26e61d45_JaffaCakes118
-
Size
138KB
-
MD5
ce23cc41cc9a2751847a0e2a26e61d45
-
SHA1
32fd9337caa49a67e514587ff4015002e28c58bf
-
SHA256
479edb664305ca5549a9189b600b7ba43f527f5b695868dbc485c5179b72253a
-
SHA512
81bbd7fd21306705c917a92c31e897003a7f471b3f829f6f2ea5ab0616263fa659d30f92d9d88c025015cd15795c588195cd446296a10b85df1f6d14639fd65a
-
SSDEEP
1536:I3BSP/5qSml3iTEQXHZADZcML4xBlf5O7JeMpgBoYokHVvxSZH863yCYNcfff3E0:IRDxlyTEQXHZAloloVPY9Wh38i+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ce23cc41cc9a2751847a0e2a26e61d45_JaffaCakes118
Files
-
ce23cc41cc9a2751847a0e2a26e61d45_JaffaCakes118.exe windows:5 windows x86 arch:x86
0f78030471e0cd0b00fa2f25528de727
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_initterm
_except_handler3
_controlfp
__getmainargs
_acmdln
exit
_XcptFilter
_exit
memmove
memcpy
??2@YAPAXI@Z
__set_app_type
??3@YAXPAX@Z
user32
LoadMenuA
kernel32
WaitForMultipleObjects
CloseHandle
VirtualFree
LoadLibraryA
GetProcAddress
VirtualAlloc
GetModuleHandleA
GetStartupInfoA
CreateThread
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE