Static task
static1
Behavioral task
behavioral1
Sample
cecba8645f4b505c97ba18953808cb3c_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cecba8645f4b505c97ba18953808cb3c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cecba8645f4b505c97ba18953808cb3c_JaffaCakes118
-
Size
108KB
-
MD5
cecba8645f4b505c97ba18953808cb3c
-
SHA1
74e9c40895844e29ab72f0cc204882cca2c0796a
-
SHA256
d0989d36bdddb5af02e40eda58116e29b53b67089f77fa022d0fc5fd75ef7175
-
SHA512
6069fee8e77a40ef7e370b217e4f0e10a2ffb977a35f8169b9acefbb3e7c02d3a98b028f89113cc0d0831b3d74c4ec6c5bff756f5c2b204272142de34cf84045
-
SSDEEP
3072:/Lc5wRzKPZy97NiO99PRl6JOtCmJRyO4fuZznGV:Dc5sgZy97NiO99PRwJOsmJR54fuZa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cecba8645f4b505c97ba18953808cb3c_JaffaCakes118
Files
-
cecba8645f4b505c97ba18953808cb3c_JaffaCakes118.exe windows:4 windows x86 arch:x86
9b4064394d5aad6266664bf55b7662e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
AddAtomA
ExitProcess
FindAtomA
GetAtomNameA
SetUnhandledExceptionFilter
msvcrt
_isatty
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_flsbuf
_iob
_onexit
_setmode
abort
atexit
atoi
exit
fclose
fgets
fopen
fprintf
fputs
free
fwrite
malloc
memcpy
memset
printf
putchar
puts
realloc
signal
sprintf
strchr
strcmp
strcpy
strlen
strncmp
strncpy
vfprintf
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 207KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE