Static task
static1
Behavioral task
behavioral1
Sample
19125231a8739addff47b01266c919c2_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
19125231a8739addff47b01266c919c2_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
19125231a8739addff47b01266c919c2_JaffaCakes118
-
Size
120KB
-
MD5
19125231a8739addff47b01266c919c2
-
SHA1
4e2adb179efa49b605a460a4230760ccc6826d2b
-
SHA256
5277edefa48506eab19ae5da103e51e780026c763b0bbeba70da189fefdc36b7
-
SHA512
a0af83ad3f5eb421f30f2dd2403307b913df058e168ed6ad89f8c4b18e30c38dbd02e3ced083f5e8bb9d7e85571d784e53edecd0466b56bf815f7b9be5511bea
-
SSDEEP
3072:Ghj+qo9yG/zSCOANSz6kwy+QbBbK5SCLwVh6MrBEJt6m9V7:GhSL/2ESzIQbBbKgAwVhJr0gm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19125231a8739addff47b01266c919c2_JaffaCakes118
Files
-
19125231a8739addff47b01266c919c2_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 78KB - Virtual size: 184KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 23KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tkrgxeu Size: - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PEPACK!! Size: 1KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Polyene Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE