Static task
static1
Behavioral task
behavioral1
Sample
2c774e8aad3e064143a933281b5a9af4_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2c774e8aad3e064143a933281b5a9af4_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2c774e8aad3e064143a933281b5a9af4_JaffaCakes118
-
Size
38KB
-
MD5
2c774e8aad3e064143a933281b5a9af4
-
SHA1
b134a36e9fc306533ebaf02acdd519c27b1c03b6
-
SHA256
02be5242de7d7c842eed311ad8c579bb6d051111453e5bb9b52a05ae9d80db15
-
SHA512
eaaa1b32dadd3f5bec87f758fe1271fe631158a1fb57cc4ad7ac74c65a88794c28f4d21c7561a5acf8f0cd10df32f6b47cb6f3c20a27cf8bf23d9f1c6524891b
-
SSDEEP
768:wG9hQQ1bF+7e3120qwIIKDGV/UQ0rGIcFIzMKkK5nOG22jbzM1l+:wOQQe7F0qwIIQGJUQ0VMMOG22jbI1l+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c774e8aad3e064143a933281b5a9af4_JaffaCakes118
Files
-
2c774e8aad3e064143a933281b5a9af4_JaffaCakes118.exe windows:4 windows x86 arch:x86
eee9062b8cbe1efb89c250150605b1a4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
FatalExit
Sections
CODE Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 512B - Virtual size: 320B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 1KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ccp3p Size: 2KB - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE