Static task
static1
Behavioral task
behavioral1
Sample
5ffbf57ec40d51d033cc172346732701_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5ffbf57ec40d51d033cc172346732701_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5ffbf57ec40d51d033cc172346732701_JaffaCakes118
-
Size
903KB
-
MD5
5ffbf57ec40d51d033cc172346732701
-
SHA1
107e761f483f020e5f85b56a1b5fbc282eaad5a8
-
SHA256
1739d6b6befa1e13e32cb93cda7fd0cd5eb00c27e993388d864a3598543a3861
-
SHA512
8bcdf13c61b6972e1ca006227777ef419763bb230ea645dfd2d7086b1cf9bf224a1ec986623f13add8d188f37eef4f02bf5c75d9a68b80723cd42e55f7ab3c5a
-
SSDEEP
24576:jvksLWtkrPi37NzHDA6Yg5dsfoTzbxyStZOLHHcXBJRfN:jfzrPi37NzHDA6Y0dsfofNKHI/V
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5ffbf57ec40d51d033cc172346732701_JaffaCakes118
Files
-
5ffbf57ec40d51d033cc172346732701_JaffaCakes118.exe windows:1 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 575KB - Virtual size: 575KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 8B - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nkh Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE