Static task
static1
Behavioral task
behavioral1
Sample
36e4383cacb41107aaf3de4611a6b030_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
36e4383cacb41107aaf3de4611a6b030_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
36e4383cacb41107aaf3de4611a6b030_JaffaCakes118
-
Size
69KB
-
MD5
36e4383cacb41107aaf3de4611a6b030
-
SHA1
f959fd00c14edb2c7e39df754bced80dae444751
-
SHA256
01a3ec91dade3f9a7d291543590a3afe6bb076ad208b50a4ea0a22e62cc541be
-
SHA512
770900662a403c2da79408968ecba48c4d1b410436c94a9ba77f4caa92fc9bf2c0a8f3abde9b2a3fbebfe553ddace1f984cc3437e1c2d2ec9d0556530ab37f28
-
SSDEEP
1536:ItagQr8M4eCilOrfmsfnomlAhbC8q/MTQ9TOVlSKamyArC6:Icruh/r+sgmA2bQQN+damys
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 36e4383cacb41107aaf3de4611a6b030_JaffaCakes118
Files
-
36e4383cacb41107aaf3de4611a6b030_JaffaCakes118.exe windows:4 windows x86 arch:x86
d5e0355f8764c235b38759b860077ceb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleA
LoadLibraryA
user32
MessageBoxA
Sections
.rxdata Size: 42KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rxdata Size: 10KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CODE Size: 1KB - Virtual size: 5.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CODE Size: 7KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dotfix Size: 2KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE