Static task
static1
Behavioral task
behavioral1
Sample
0f4d29933b367aba1f98347105e75142_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0f4d29933b367aba1f98347105e75142_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0f4d29933b367aba1f98347105e75142_JaffaCakes118
-
Size
262KB
-
MD5
0f4d29933b367aba1f98347105e75142
-
SHA1
376c1f7ada089839b3c7fe850b7cff12ff7f29c7
-
SHA256
97a02f08717278abd7c65f5d4eeb6dd78c8fce92fd85d36cd33da96c2e3695dd
-
SHA512
fefb506f600a4b42cd94e93411c3601a074a9205bf83dffac83c8618edeed97f510309f803046e82164279f414057397b0595bfbddcd62cb11281f0590562a57
-
SSDEEP
6144:0tFTRMY9hOqAbx98gWNlPTGQQm6agrdKfO1tG:059hPNtTirdIO/G
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f4d29933b367aba1f98347105e75142_JaffaCakes118
Files
-
0f4d29933b367aba1f98347105e75142_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 16KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 68KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 132KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE