F:\Office\Target\x64\ship\postc2r\x-none\msohtmed.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2973824de9a57eddfc1a7e44a117cbde_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2973824de9a57eddfc1a7e44a117cbde_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
2973824de9a57eddfc1a7e44a117cbde_JaffaCakes118
-
Size
1.5MB
-
MD5
2973824de9a57eddfc1a7e44a117cbde
-
SHA1
ec095a73be893394802d29deb7db15aa61f3cccd
-
SHA256
e48271ffc03dca5deccf3d197948ff38d217d83d98bf0d3c8f1d177ad1c4ccbb
-
SHA512
5bc13848f13ad63ea8ab4c45d4d3d690f97011de46b660283264c7790a5b249e6cb458c28e74dddbfeff02f91c6d9c725cfdfc3efd8cc8bc37b92281f5a6795a
-
SSDEEP
12288:dYsiWDb44I7aQEwhT94wwMcMT5AL9IW1dXggl6iES/MHmgH:ysVXp1SOG5AL9IW1dXg3S/MHmgH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2973824de9a57eddfc1a7e44a117cbde_JaffaCakes118
Files
-
2973824de9a57eddfc1a7e44a117cbde_JaffaCakes118.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.c2r Size: 512B - Virtual size: 276B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ