Static task
static1
Behavioral task
behavioral1
Sample
f179962380ef475f7051d1a670d545e8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f179962380ef475f7051d1a670d545e8_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f179962380ef475f7051d1a670d545e8_JaffaCakes118
-
Size
1.2MB
-
MD5
f179962380ef475f7051d1a670d545e8
-
SHA1
49f757fec9d53c44bbf2f47c6e758fe256c4a50f
-
SHA256
cd6bdf2eb05527354c1ca51c6a0a3e61ff5862ab86344a40a61cedf577c4aac2
-
SHA512
94b3fd785b8ae5027067f7aa2b12ea5013b5b754ce06ad7dc3e118bf57ac616d9c05ba4f390b8dd92ee1a3fff0839685f5e4daae0953956a100cbcc467a17917
-
SSDEEP
24576:6oQmX+TRUyIghMtmmc06++kDXRGELPpFUV:gmOTR/MFx+kDhGKUV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f179962380ef475f7051d1a670d545e8_JaffaCakes118
Files
-
f179962380ef475f7051d1a670d545e8_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 71KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 784KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 359KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 114B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE