Static task
static1
Behavioral task
behavioral1
Sample
2e784e969f9dc8e58b077a193f642336_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2e784e969f9dc8e58b077a193f642336_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2e784e969f9dc8e58b077a193f642336_JaffaCakes118
-
Size
7.6MB
-
MD5
2e784e969f9dc8e58b077a193f642336
-
SHA1
cbe0f61e0d41ead1ac30309c4193cb260108932c
-
SHA256
d859c816c562b0c806b6f2266965db4ff452f88b6d20029ab355df935393013c
-
SHA512
1c185716e2fc867cbb731ab7d575390987f82ba0456c5100cf27cadd7f85f0467dc0c7c48df8694922b12da9e41caa61a2962f936603debdd64c11a9e7ea73d5
-
SSDEEP
196608:AwD7quFZ+lMD/gJ0MLeJNEfXLsHyGlfg8YtTSZzKKY9:d1qiD/gJ3oEfbsHycfqTSAv9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e784e969f9dc8e58b077a193f642336_JaffaCakes118
Files
-
2e784e969f9dc8e58b077a193f642336_JaffaCakes118.exe windows:1 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 588B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nkh Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE