Static task
static1
Behavioral task
behavioral1
Sample
d9a2a2a31e09b89bee93c7e6a408d93e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9a2a2a31e09b89bee93c7e6a408d93e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d9a2a2a31e09b89bee93c7e6a408d93e_JaffaCakes118
-
Size
330KB
-
MD5
d9a2a2a31e09b89bee93c7e6a408d93e
-
SHA1
de5430938884153e1dcab296fe3f388914a83d3d
-
SHA256
ed33653e92f0cc3c49c1b20b239096e6628c800fb78d1e89182029211ba08cc3
-
SHA512
522655b7f1d6bdd1aaacd3caca2f8a22ae09832a1d747c1c121b2c158e9a19cb47fe11008c9221aa19b0c6d322a19c686c40669d3c5a8f3b2d24d9e815979fee
-
SSDEEP
6144:nYjQLUDaUgfygVpaUhxt2U+e029uBVUSFa8Bt2RsDT3XorSvVnBvVE69+lg:nXUDa5fhPa4EdqkVUSPdorS9BtE69Mg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d9a2a2a31e09b89bee93c7e6a408d93e_JaffaCakes118
Files
-
d9a2a2a31e09b89bee93c7e6a408d93e_JaffaCakes118.exe windows:4 windows x86 arch:x86
f4c21f1b4e79e65c35d584d0f52e10d2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strncpy
srand
??3@YAXPAX@Z
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__CxxFrameHandler
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
??2@YAPAXI@Z
_snprintf
rand
malloc
strtol
__getmainargs
calloc
_itoa
kernel32
GetTickCount
LoadLibraryA
GetProcAddress
GetModuleHandleA
Sleep
GetStartupInfoA
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 316KB - Virtual size: 316KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
j29A6emZ Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE