Static task
static1
Behavioral task
behavioral1
Sample
df4f52d40949957f54758912a038922b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
df4f52d40949957f54758912a038922b_JaffaCakes118
-
Size
44KB
-
MD5
df4f52d40949957f54758912a038922b
-
SHA1
084203d443f1a4d94f7e9cae206268e73b916911
-
SHA256
ceeab44192692e0f039521ecd32eac2dbb10d50dbe3aab5aef4ba2c00e6ae381
-
SHA512
1e1de92d4dae221e29d8c9aaae82e9ae3d4943c493f72892fc351c71b6aa82dd4085af58c5ceae2c13e5dd26e1ef946fa5ecfd1e665b26efb0053bba11a1c8c9
-
SSDEEP
768:/ydH5/WCE/38wjXSH5uni9rXpJj48mvsMtRf3V+/Q3GCr2K1f2n7aeX2DE:u5/nE/38wjiZunwXpksMtRfPHr2YeOPQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df4f52d40949957f54758912a038922b_JaffaCakes118
Files
-
df4f52d40949957f54758912a038922b_JaffaCakes118.exe windows:4 windows x86 arch:x86
8b8b5f2a0f03c8a0d1f63d719c9c20d2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
AddAtomA
ExitProcess
FindAtomA
GetAtomNameA
GetCommandLineA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
LoadLibraryA
SetUnhandledExceptionFilter
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
calloc
fflush
fprintf
free
malloc
memcpy
memset
signal
strcpy
strstr
strtol
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 11KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE