excel.pdb
Static task
static1
Behavioral task
behavioral1
Sample
10483d3d4616db77395004d5bdc4b6a7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10483d3d4616db77395004d5bdc4b6a7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
10483d3d4616db77395004d5bdc4b6a7_JaffaCakes118
-
Size
300KB
-
MD5
10483d3d4616db77395004d5bdc4b6a7
-
SHA1
5ea2e2aa38ef4c5249d03ff2c65b802300717fe4
-
SHA256
bcbe09c9e999a5f4c4e81b0a3af63ce2a749fda54ce92939fe296d73946491f1
-
SHA512
3427f2fab3914d09b09fff1d97f60c9119c4e4fa240e918c9565310e6cbae689a144ff49d86436fa5fb6f5326b57e50a7f8981fe64d52ab1adf3ee2e0f28c0c4
-
SSDEEP
3072:zc7mL3Ootyi69d6/JbyoemYFDC5vtaT6eJVoC9uFR6dFgO1xQv4RNxuYtCZfEtLF:g7mL3OZpbUSM5GWR6d/4v7Y4JGYanEQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10483d3d4616db77395004d5bdc4b6a7_JaffaCakes118
Files
-
10483d3d4616db77395004d5bdc4b6a7_JaffaCakes118.exe windows:4 windows x86 arch:x86
b940cadb80c6ab17c0d6c9725b30af77
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ExitProcess
FormatMessageA
GetLastError
SetLastError
VirtualAlloc
CloseHandle
MapViewOfFile
CreateFileMappingA
VirtualFree
GetProcAddress
VirtualProtect
LoadLibraryA
GetModuleHandleA
GetModuleFileNameW
UnmapViewOfFile
HeapFree
lstrcpynW
GetFullPathNameW
SetEnvironmentVariableW
HeapAlloc
GetProcessHeap
GetFileSize
ReadFile
SetFilePointer
CreateFileW
WideCharToMultiByte
Sleep
MoveFileW
GetSystemTimeAsFileTime
DeleteFileW
lstrcpyW
lstrlenW
GetEnvironmentVariableW
user32
MessageBoxA
Exports
Exports
DllGetLCID
MdCallBack
_LPenHelper
Sections
.text Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.res Size: 289KB - Virtual size: 292KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 132B - Virtual size: 9.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE