Behavioral task
behavioral1
Sample
21a4f346cbaed4cd39eb66b77b79723d_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
21a4f346cbaed4cd39eb66b77b79723d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
21a4f346cbaed4cd39eb66b77b79723d_JaffaCakes118
-
Size
476KB
-
MD5
21a4f346cbaed4cd39eb66b77b79723d
-
SHA1
79a87ff6c83f3686d5d6d1918396e4343fce3672
-
SHA256
19cdcd13d6d6f6430abb98026d9f6aa90a820753a13f546503fa273ce8bedc2d
-
SHA512
377f2ec3e189da855258e2c77a06f2b64faf24407aba1baee3ed3cd0331342ec0891b304ff85601de16ab4a5b3a1267a1a0b4368cfae6f3dd2ef3c7f1f7fecbb
-
SSDEEP
3072:DVSPM7NwcvL+P+zNzgEA6IIjk9Hc3/nl6LAHkzI1U8mddJmKZdz8ezpveW27:oPM7NtcGrA8k96jZe1veWc
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 21a4f346cbaed4cd39eb66b77b79723d_JaffaCakes118
Files
-
21a4f346cbaed4cd39eb66b77b79723d_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.scpack Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE