Behavioral task
behavioral1
Sample
381233faa4a763eb682080794158762e_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
381233faa4a763eb682080794158762e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
381233faa4a763eb682080794158762e_JaffaCakes118
-
Size
820KB
-
MD5
381233faa4a763eb682080794158762e
-
SHA1
d90013177ad1c362896081468737b3664a67218d
-
SHA256
96071e55cdf68c6cc311a1ad36df6da7ca1ccca059063b149894bdaf810a4cb0
-
SHA512
8060e71124eba9c237e1047435925de046c9adf006813ca536ba7f908d37b0b56b6c220bb2d566c3adac605fa6c34210c315e5772c34095e3a95e4e8a87c313b
-
SSDEEP
12288:YsE/x5ZPr/Tv9RxM49V1kv7iLXNgJNx8jLuuLMqFIpaBCuLeGPF0D:a/xLNVY7iOJ30pMfpa57t0
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 381233faa4a763eb682080794158762e_JaffaCakes118
Files
-
381233faa4a763eb682080794158762e_JaffaCakes118.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 14KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 794KB - Virtual size: 960KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE