Static task
static1
Behavioral task
behavioral1
Sample
3a2291329afdf67bfc5227400a94a09b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3a2291329afdf67bfc5227400a94a09b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3a2291329afdf67bfc5227400a94a09b_JaffaCakes118
-
Size
170KB
-
MD5
3a2291329afdf67bfc5227400a94a09b
-
SHA1
46cf88d15a5d16f6f2333c460860a2d78ab0ee1f
-
SHA256
1cec3dcd4af825dfea9deeeb1bf0eb467fe7a7333b264e914a97fa6c0435acaa
-
SHA512
250c2554e9f9127bdea00b700bc3da339eacdb109084aceac36bb97c34337ff1154d37a1e0ed17f0d414cfa06f809a7fd43418d948763d90b4c37e2af5412b43
-
SSDEEP
3072:Om2sVYfB+dPvUIGPtiPoiKJ3e9NMfR1Xje4D:v2SYpcPvUIqMoxpe9NMfT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a2291329afdf67bfc5227400a94a09b_JaffaCakes118
Files
-
3a2291329afdf67bfc5227400a94a09b_JaffaCakes118.exe windows:5 windows x86 arch:x86
e97b9d7a50364ad36a6a31341ce0658c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileW
LoadLibraryW
GetLastError
LoadLibraryA
msvcrt
memcpy
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 628B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.1 Size: 512B - Virtual size: 7B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.2 Size: 512B - Virtual size: 7B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.3 Size: 512B - Virtual size: 7B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.4 Size: 512B - Virtual size: 7B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data3 Size: 143KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 850B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ