Static task
static1
Behavioral task
behavioral1
Sample
dcc7d3f80621def9896484cc94cc26ae_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcc7d3f80621def9896484cc94cc26ae_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dcc7d3f80621def9896484cc94cc26ae_JaffaCakes118
-
Size
25KB
-
MD5
dcc7d3f80621def9896484cc94cc26ae
-
SHA1
f7e1a7f577e36d25d92bead78c114e4b2f51b839
-
SHA256
98793965e7d1a084e503b156f8316b6505359f63d663dbe600bdbe8b6d06c3fc
-
SHA512
e73b35b7f72614652838972627b7be98e773e7d499186d23e698c9fd6f91827db34e8e811180a72cad7aaef77557993e0f7bf8931f4905f06b191c5812b17ea5
-
SSDEEP
384:hPazQ3jyaL0vapnTzj9FXUPpWfkoXCyD5pZL1wI1qbjLqi+/S2WAE7t9YBP2:hCMBLxziWbXHDTZL1wQwm/S2mM+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dcc7d3f80621def9896484cc94cc26ae_JaffaCakes118
Files
-
dcc7d3f80621def9896484cc94cc26ae_JaffaCakes118.exe windows:1 windows x86 arch:x86
79da2d4ddf413bb84ef8b1401d9eca85
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
Module32Next
GetProcessPriorityBoost
DisconnectNamedPipe
FileTimeToDosDateTime
Module32First
IsDBCSLeadByteEx
GetLocaleInfoA
GetDllDirectoryA
SetConsoleInputExeNameA
OpenFile
GetModuleFileNameA
VirtualAlloc
GetSystemWindowsDirectoryA
SetConsoleOutputCP
GetUserDefaultLCID
GetLogicalDriveStringsA
RemoveDirectoryA
FlushViewOfFile
GetThreadLocale
GetProcessShutdownParameters
GetConsoleCP
GetLogicalDrives
oleaut32
SysFreeString
winspool.drv
EnumPortsW
msvcrt
_except_handler3
ole32
StringFromGUID2
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ