Static task
static1
Behavioral task
behavioral1
Sample
15c80846fe94964a600009de38844912_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15c80846fe94964a600009de38844912_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
15c80846fe94964a600009de38844912_JaffaCakes118
-
Size
383KB
-
MD5
15c80846fe94964a600009de38844912
-
SHA1
c3d1f7a72493c0a506b1dbd6a73295ee16359e74
-
SHA256
1e3a13c1c0e8a7ee6b873f5adc63a189bb9b7a859105ca31b76e9ecb2868f6a6
-
SHA512
fb2b758ea02139e39efac1c702d5193d0823f3b6231307cdd36b3469c8e4c89e0c105a733f83fc80c2f03cfb5d7b2694051807cbaa4465529b0324249a5e83aa
-
SSDEEP
6144:WKFiYeukbqjt9plBn8zxpsov2MU8zLFY0WD7UE4/zPerG0vEv64I:fe6x9NnGxpn2Myt4E+2JML
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 15c80846fe94964a600009de38844912_JaffaCakes118
Files
-
15c80846fe94964a600009de38844912_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 2KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 321KB - Virtual size: 324KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
eiwen.. Size: 3KB - Virtual size: 2KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
weiwen Size: 46B - Virtual size: 46B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE