Behavioral task
behavioral1
Sample
a8aacd30d1d79e5862e23a0cd78b7d3e_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
a8aacd30d1d79e5862e23a0cd78b7d3e_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
a8aacd30d1d79e5862e23a0cd78b7d3e_JaffaCakes118
-
Size
254KB
-
MD5
a8aacd30d1d79e5862e23a0cd78b7d3e
-
SHA1
84539dd812aa499a33c46e5c09e9ff1e1049f8b7
-
SHA256
830036e049b8a95d18a107d090dddac7670464e76658052899a0c35e585cc906
-
SHA512
5541f1e137f0e99b7918cd625e0611cc970c7f3a9b56cbcedf9e898e9e5c57b53954e9160ee4481958711b0a0f70b41eceb8cedf2eee5da731ad3d76b7416018
-
SSDEEP
1536:dN2hlIu8u9Ic+jsQS5qoiE9yLxEFiW95EOZA0YDCd/ZLkh/dJw1vhAimkvzugD4V:P2hau8WIc+I2oi/LaHHkJ84Hys3
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a8aacd30d1d79e5862e23a0cd78b7d3e_JaffaCakes118
Files
-
a8aacd30d1d79e5862e23a0cd78b7d3e_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.code Size: 6KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 26KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 10KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 205KB - Virtual size: 208KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE