Static task
static1
Behavioral task
behavioral1
Sample
41bc76ec688268f351d793bf8eacc474_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
41bc76ec688268f351d793bf8eacc474_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
41bc76ec688268f351d793bf8eacc474_JaffaCakes118
-
Size
447KB
-
MD5
41bc76ec688268f351d793bf8eacc474
-
SHA1
c7afcc9430dec460d398e1640db56b094cc0afff
-
SHA256
c86fdb44d0215ecb4257b67a3ec199c5a4b220c11a0735335b42eff284876fb8
-
SHA512
893afddecc64ef7353070c0ba5eddefa4129aaf9609f128d763d74b236458efa84b36b69912c21fa5d94411337f38e34629d3b7dce87a096205df1574d9d12bf
-
SSDEEP
12288:thEvaTq+91VMF3Z4mxxoV0aaobTEvsxjsq:MyTqi1CQmX0tlvw8R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41bc76ec688268f351d793bf8eacc474_JaffaCakes118
Files
-
41bc76ec688268f351d793bf8eacc474_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 14KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 93KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 333KB - Virtual size: 336KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE