Static task
static1
Behavioral task
behavioral1
Sample
37a911a55d4e1bcdf1c6090f05f91ca3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
37a911a55d4e1bcdf1c6090f05f91ca3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
37a911a55d4e1bcdf1c6090f05f91ca3_JaffaCakes118
-
Size
104KB
-
MD5
37a911a55d4e1bcdf1c6090f05f91ca3
-
SHA1
357d1b1a9647cec040a683f012e3d6948888849a
-
SHA256
e9ce88d7fac9e764b91d343b3bcc7329534117014ed6bf5120c05e65049e567e
-
SHA512
d9a8edee5fcfec303f6e177a9cec2d2100f6e31bf334d03c5f998b911c266976aefa069eff861a46be6eab382e881003e041076bdc491892f2459f480507ea54
-
SSDEEP
1536:XaJUOLywb7+pb601ZPpDeokizAO+xXhlLoNsJYAJ/6b3T53TJHkOUST0WW+W0PkN:sRxa9fC4AO+GsJYGGF3lkrbO8s4IOB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 37a911a55d4e1bcdf1c6090f05f91ca3_JaffaCakes118
Files
-
37a911a55d4e1bcdf1c6090f05f91ca3_JaffaCakes118.exe windows:5 windows x86 arch:x86
5f86156771da29ab6ea2953d8553c00c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowDC
shlwapi
ChrCmpIW
kernel32
GetCurrentDirectoryW
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rt_ecx Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
rt_eax Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
rt_esp Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
rt_edx Size: 512B - Virtual size: 54B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
rt_ebx Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ