Static task
static1
Behavioral task
behavioral1
Sample
39a310a6462ad44e744ee6c8a29dfe80_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
39a310a6462ad44e744ee6c8a29dfe80_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
39a310a6462ad44e744ee6c8a29dfe80_JaffaCakes118
-
Size
975KB
-
MD5
39a310a6462ad44e744ee6c8a29dfe80
-
SHA1
767e9ca543cc9934a7d8d55fcc33ef77ab521a29
-
SHA256
3fc8c03576d01673950631c3812aa18c8259db4535ea19f94467f3f2fd02a508
-
SHA512
9b441bdf4960aaa05b32c6b7394a11e5465ef6b470670c68a35babb5b02a60a8c15d8d9ad55bc0ce5d9f17e5f5f159e1f761a92b86e67e35b4ba6202d4d98d57
-
SSDEEP
12288:4pqiC/2OGAtkCP4cejGSOpRK3CGYKwnP0qtScwn:4po/2+ttPJLfpRK3CGYKwncq7W
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39a310a6462ad44e744ee6c8a29dfe80_JaffaCakes118
Files
-
39a310a6462ad44e744ee6c8a29dfe80_JaffaCakes118.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 495KB - Virtual size: 495KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 11KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ordata Size: 199KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mfutrez Size: 123KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ebwcnwr Size: 1KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE