Static task
static1
Behavioral task
behavioral1
Sample
d26b1e133d086e0f64d072704ceb2eec_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d26b1e133d086e0f64d072704ceb2eec_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d26b1e133d086e0f64d072704ceb2eec_JaffaCakes118
-
Size
426KB
-
MD5
d26b1e133d086e0f64d072704ceb2eec
-
SHA1
e880db4feca490bbf1bad244fed3856f19dd128d
-
SHA256
be27af950a8c983558c5ce928a636ff2a0a1b628b03949d54801fad968676756
-
SHA512
f5789646b9ecd4e72dadaf665b3f3d84925de32eda00da12410d8f96ac938b51dcd55c08fae8abca3129442670690d00bca60b3f6a1f8a9e798eb9d321a5cc6b
-
SSDEEP
12288:yeNkOHDkhT78kwkHb7qO4VhDDQ/Ga3PUwJbYZUk9Rs:yuHDk/Pz4Va/ZsKyr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d26b1e133d086e0f64d072704ceb2eec_JaffaCakes118
Files
-
d26b1e133d086e0f64d072704ceb2eec_JaffaCakes118.exe windows:4 windows x86 arch:x86
22deaa3e5166e3019a02358581c9a9ee
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
_lopen
ExitProcess
user32
MessageBoxA
shell32
ShellExecuteA
Sections
Size: - Virtual size: 520KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 325KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 32KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 361B - Virtual size: 524KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.svkp Size: 56KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE