Static task
static1
Behavioral task
behavioral1
Sample
128f22207d53d4bab0ce96e1743f67eb_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
128f22207d53d4bab0ce96e1743f67eb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
128f22207d53d4bab0ce96e1743f67eb_JaffaCakes118
-
Size
18KB
-
MD5
128f22207d53d4bab0ce96e1743f67eb
-
SHA1
a0ee002ba8032826b9e26f007c49fb2597c4274d
-
SHA256
f3601b48c8275f0c582cf5eac0c9d69fe9fca8a7022fa0d4a398527437c05edd
-
SHA512
29d85abed67372b2ddb070ee5beef3b363baf15e5ac683bdf6ad274adb8ae9490d19b6f59fd72c6a6a52b2129bf706c825dea71f5d54b9acf55f3fe7c7bd94e0
-
SSDEEP
384:wfdzeCVbjn8p/6aQhyPhyqVLvOcVtMiqis9QlcffyqmeJ:QemAdHPhyqVlqisKl4qZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 128f22207d53d4bab0ce96e1743f67eb_JaffaCakes118
Files
-
128f22207d53d4bab0ce96e1743f67eb_JaffaCakes118.exe windows:4 windows x86 arch:x86
c3ff2e63283d98b193e714043622069b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
cygwin1
__errno
__getreent
__main
__mb_cur_max
_ctype_
_exit
_impure_ptr
abort
atexit
calloc
cygwin_internal
dll_crt0__FP11per_process
exit
fclose
fflush
fprintf
fputs
free
iswprint
malloc
mbrtowc
mbsinit
memcpy
memset
printf
putc_unlocked
realloc
setlocale
strcmp
strerror_r
strlen
vfprintf
cygintl-8
libintl_bindtextdomain
libintl_gettext
libintl_textdomain
kernel32
GetModuleHandleA
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 496B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE