Static task
static1
Behavioral task
behavioral1
Sample
076e92a51ed399ba6da364a546bfab4c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
076e92a51ed399ba6da364a546bfab4c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
076e92a51ed399ba6da364a546bfab4c_JaffaCakes118
-
Size
458KB
-
MD5
076e92a51ed399ba6da364a546bfab4c
-
SHA1
6001ed4a3bbf595ed7fca7ef474b623992d01088
-
SHA256
725deb1097ce51b0051423a7744f5c9c9725d735922b9163df3820938ab711d8
-
SHA512
ac7cc34e3d1ac95609916d589c16bac66e2bc745c8973f96899299a32579cf3f0045867102adb50035beacfff2f038ce77388c836ea9cf795875001e92771123
-
SSDEEP
12288:lfCS4fa6d/iG+21/9ay8DPuWMl6HZtvm3:ZlTL2ey8DGp++3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 076e92a51ed399ba6da364a546bfab4c_JaffaCakes118
Files
-
076e92a51ed399ba6da364a546bfab4c_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Sections
.XComp0 Size: 438KB - Virtual size: 736KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.XComp Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MaskPE Size: 512B - Virtual size: 250B
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MaskPE Size: 512B - Virtual size: 200B
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MaskPE Size: 512B - Virtual size: 290B
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MaskPE Size: 512B - Virtual size: 315B
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ