Static task
static1
Behavioral task
behavioral1
Sample
989f973bde68182e1da2ae5cbba52dbc_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
989f973bde68182e1da2ae5cbba52dbc_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
989f973bde68182e1da2ae5cbba52dbc_JaffaCakes118
-
Size
490KB
-
MD5
989f973bde68182e1da2ae5cbba52dbc
-
SHA1
1f5e36d103d87a123e30c643db590bae2b6ce136
-
SHA256
c830b74c07e3496716cffc9955d4b9fdda0cf58cbfdda6896e34508e9ce5ae13
-
SHA512
95c4ba429d3df426a89c20d5ff09cccadd1bfc6cc35bef155f98c08adfaf983b069d2195499a8d866e939a2f3b0e0dde9bdbceb2fc44392bec1dd26ee62edcda
-
SSDEEP
12288:e2vCCSHO8BxzDzUtV0tl6YgLLTKDv9/5bFYFdeGXAIuI:eFCSu8B939tQrul/5ZYJAIuI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 989f973bde68182e1da2ae5cbba52dbc_JaffaCakes118
Files
-
989f973bde68182e1da2ae5cbba52dbc_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 50KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 21KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
0 Size: 338KB - Virtual size: 396KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1 Size: 45KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
x.1 Size: 144B - Virtual size: 144B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ