Behavioral task
behavioral1
Sample
17d3e50c57bb7fff5ff19460573c8ddc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17d3e50c57bb7fff5ff19460573c8ddc_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
17d3e50c57bb7fff5ff19460573c8ddc_JaffaCakes118
-
Size
39KB
-
MD5
17d3e50c57bb7fff5ff19460573c8ddc
-
SHA1
b6d58f6c4bac17b6d27bf3ab39ea4077aca43c01
-
SHA256
bf20694affdab77ebcaa16f3d958e62e22394b06413936592600be988c2e75a2
-
SHA512
1a2bc77e4e51c761897206a608df1beb90aad21c97b2de40ba24186cc761b81e9d8ae16d80db94a564c924fbe4d9b9dfb257658fb0dd0108ea56513c54bf0f1b
-
SSDEEP
768:PQ0XtUznRtFdV4ujk5b7tJewtRAgko+F01RaVZ3QXcIA7loF707JGLJxILoI3G:Pn9UzDnV4ujkhBXA4+FKMVFQXeiF07JB
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17d3e50c57bb7fff5ff19460573c8ddc_JaffaCakes118
Files
-
17d3e50c57bb7fff5ff19460573c8ddc_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.scPACK Size: 512B - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.TEXT Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.DATA Size: 28KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.newIID Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE