Static task
static1
Behavioral task
behavioral1
Sample
3ffdb62d1a1828a35baa2193216b3eca_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ffdb62d1a1828a35baa2193216b3eca_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3ffdb62d1a1828a35baa2193216b3eca_JaffaCakes118
-
Size
33KB
-
MD5
3ffdb62d1a1828a35baa2193216b3eca
-
SHA1
d678f8b32da0ec64f11abef7586c21d7b737cdf6
-
SHA256
9acd4c9e766d66ae8ae1d234dfd6076dcc3a94e6e7e0632fb2527260ded05436
-
SHA512
a768a0350a9d38f1d9d53d00651ca2531c866b85665cf0c32e9a7590519151b72e2a52adde6897f8515c6a315fe5547f18e8ed2c651b17cf1cc0251170493ac1
-
SSDEEP
768:uVxQhGQo9A2f0fcyb/ZwJkbpeX4IQ6FyodHiQfPdIQqDd7Qrh7gp92Z7X2wCMaWI:cm6a+I0w4Yb7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ffdb62d1a1828a35baa2193216b3eca_JaffaCakes118
Files
-
3ffdb62d1a1828a35baa2193216b3eca_JaffaCakes118.exe windows:4 windows x86 arch:x86
1ef8cafcd29e80bac034987ebef48dcf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcp71
?_Nomemory@std@@YAXXZ
msvcr71
_vsnprintf
strtok
strcpy
??3@YAXPAX@Z
strncpy
memcpy
strcmp
strchr
_except_handler3
malloc
_callnewh
__dllonexit
exit
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
strcat
__CxxFrameHandler
srand
atoi
strstr
rand
memset
sprintf
strlen
_onexit
kernel32
GetTickCount
GetStartupInfoA
LoadLibraryA
GetProcAddress
ExitProcess
lstrcmpiA
TerminateThread
GetModuleHandleA
Sleep
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ