Static task
static1
Behavioral task
behavioral1
Sample
19ac9d494ebe1896b9b09ac207021c18_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
19ac9d494ebe1896b9b09ac207021c18_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
19ac9d494ebe1896b9b09ac207021c18_JaffaCakes118
-
Size
3.7MB
-
MD5
19ac9d494ebe1896b9b09ac207021c18
-
SHA1
6aa56f17657b58b00fd1ec8aff499d09545af467
-
SHA256
cf73cbca469932dabd9410cdcf40abb3b242995630ef6c0bdbdba1161f19ae14
-
SHA512
f302afc9446aa044a47ef93a0212c98a32dc1715428cd5bd83e447b55cd6cf7a74a86045eec7f94f8e2d6cc6b106fd92403bd4a558c613ec84e2deb011776f42
-
SSDEEP
98304:Tq4TOs5GAPuWzsbhTRpzsGVD4YMBqtAxC:Tq4aCEbTpIGVsqm8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19ac9d494ebe1896b9b09ac207021c18_JaffaCakes118
Files
-
19ac9d494ebe1896b9b09ac207021c18_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 304KB - Virtual size: 788KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 46KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 18KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2.3MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 646KB - Virtual size: 724KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 93KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 312KB - Virtual size: 316KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE