Static task
static1
Behavioral task
behavioral1
Sample
0b3f77b1071b18ecfd10b2523b8312bb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b3f77b1071b18ecfd10b2523b8312bb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0b3f77b1071b18ecfd10b2523b8312bb_JaffaCakes118
-
Size
2.3MB
-
MD5
0b3f77b1071b18ecfd10b2523b8312bb
-
SHA1
74449357511ef5dcce4ec512ea81bdae5561a5a8
-
SHA256
a90c9d04a60680be9da2fd4b65e4a1ccb0d469963806629fb8a1f4d9b00fa6a1
-
SHA512
ef50186c8725ca097a407a5742a4d9f0f4b7e4e4d8f0a6791873b8541cf4492775700a5c0276fbec489f02415b22d78b3d51de4f45c8b8bd72d3512aa80dfc6c
-
SSDEEP
49152:CozmcWxXcdCRz8C6k1Bd5GfA104hxFmyDnC21bdUGZV:JzmcWaybBzxY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b3f77b1071b18ecfd10b2523b8312bb_JaffaCakes118
Files
-
0b3f77b1071b18ecfd10b2523b8312bb_JaffaCakes118.exe windows:4 windows x86 arch:x86
88381b84da56810b869e897e6d45bd58
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
user32
EnumChildWindows
Sections
tgtolpyq Size: 504KB - Virtual size: 504KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
nequmkgl Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
lvvejxva Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jspvicej Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.main Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.stub Size: 428KB - Virtual size: 428KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE