Static task
static1
Behavioral task
behavioral1
Sample
11a7250931c5c95158d9ec52796ede8d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11a7250931c5c95158d9ec52796ede8d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
11a7250931c5c95158d9ec52796ede8d_JaffaCakes118
-
Size
24KB
-
MD5
11a7250931c5c95158d9ec52796ede8d
-
SHA1
b544544bee76c8001d814dea3998219df6a7ef32
-
SHA256
4abd8549e2f66fd4e944aa9515ca9fdde2c8aa3272ee8c8052d343356115b2c9
-
SHA512
914a2a375f5cceb8ff6b36371e9fec629c6f728567736daabd2b263e19d654bde311b5874904ec6fb6ebf4f46e64c2260679bd2ea1cf587f4a6b00e8c2465557
-
SSDEEP
768:kmYnEj7ZuAiDRvpt1lPTPhyqVB2PisKl4qF:kuCTpP4PisKldF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 11a7250931c5c95158d9ec52796ede8d_JaffaCakes118
Files
-
11a7250931c5c95158d9ec52796ede8d_JaffaCakes118.exe windows:4 windows x86 arch:x86
5bd5f78f8f68bc90c1aac40ea6674982
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
cygwin1
__errno
__getreent
__main
__mb_cur_max
_ctype_
_exit
_impure_ptr
abort
atexit
calloc
cygwin_internal
dll_crt0__FP11per_process
exit
fclose
fflush
fprintf
fputs
free
getenv
iswprint
malloc
mbrtowc
mbsinit
memcpy
memset
printf
putc_unlocked
puts
realloc
setlocale
strchr
strcmp
strerror_r
strlen
strncmp
strndup
vfprintf
cygintl-8
libintl_bindtextdomain
libintl_gettext
libintl_textdomain
kernel32
GetModuleHandleA
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 560B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE