F:\Office\Target\x64\ship\postc2r\x-none\msoxmled.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ec7abc7bbfb23d350f6854db88140efc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec7abc7bbfb23d350f6854db88140efc_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ec7abc7bbfb23d350f6854db88140efc_JaffaCakes118
-
Size
1.0MB
-
MD5
ec7abc7bbfb23d350f6854db88140efc
-
SHA1
f0f56d6df7f4b0960d1a66152ca01b1368074ec0
-
SHA256
b0375a14393805e7c85a1ed407d6f238b355a24587049f75f3db45552415460c
-
SHA512
45e7580610b98af4f6f6a70556199c9e0aecc1550d44aec078aa53787dc68059992b854ee488f68145e6e92c5a38e12da1d8209553712913f1e5dcf97111427c
-
SSDEEP
12288:Di8C+lPYJwWBwQcHuH0CACm/UbB2wui8C+lPYJwWBw4:Dc+lPYJw7HuH0H8bgc+lPYJw4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ec7abc7bbfb23d350f6854db88140efc_JaffaCakes118
Files
-
ec7abc7bbfb23d350f6854db88140efc_JaffaCakes118.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.c2r Size: 512B - Virtual size: 296B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 165KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ