Static task
static1
Behavioral task
behavioral1
Sample
4905d6ea2ca476b16d09610f5cbc0fc1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4905d6ea2ca476b16d09610f5cbc0fc1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4905d6ea2ca476b16d09610f5cbc0fc1_JaffaCakes118
-
Size
177KB
-
MD5
4905d6ea2ca476b16d09610f5cbc0fc1
-
SHA1
7e3f8005386436deabe6b331358851c2bf610b59
-
SHA256
6bfba8e67f4b2517df7714ef315a32544a3b80d389b4bb369fc31636494fb662
-
SHA512
646d640796fb7e658a24aef8a5a5f22a28d5645849500798b72e5c0130be775afe845bb728e4fd231ae85dcfcb41034743cd7c41d15d553d8a5b06e0b292fda9
-
SSDEEP
3072:OHcG+oBSotdDrDyYVPTnAKOPbGuHPTKMnqcJ1VwFKHad18RsEmQfNdTTsxdf6Pr2:+XQoL+EEbCMnqc8qad186QDvsxdf6Pr2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4905d6ea2ca476b16d09610f5cbc0fc1_JaffaCakes118
Files
-
4905d6ea2ca476b16d09610f5cbc0fc1_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.i4gnh8 Size: 1KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.k$wkf3 Size: - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fq$z9z Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.opzlen Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ysjznh Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 956B - Virtual size: 956B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.engine Size: - Virtual size: 3.0MB
.info Size: - Virtual size: 448KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.debug Size: 116KB - Virtual size: 120KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE