Behavioral task
behavioral1
Sample
677da4ccf4a11b658874f4999e0c485b_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
677da4ccf4a11b658874f4999e0c485b_JaffaCakes118
-
Size
3.5MB
-
MD5
677da4ccf4a11b658874f4999e0c485b
-
SHA1
2cbc97e3505938896316c100b8d924dcd4f974b0
-
SHA256
1bae4143f3279399dcc695bca38d3524488c54d9e60482d52c0b1a3c15c85ed6
-
SHA512
8e8fce3e1c11f707a8ac3c866bcd579bff836a48caded8ad7134195f2d28710a63193d17e79b163c6c0e923acc82474e0d7f35bb07b37ff41fce42415148ef1e
-
SSDEEP
49152:gWdazm0qXUgCJZRdZPVSdTjP9+k46kwDUBAXtIjD8+rv8fPv8ZSvYRq1K2LJFLyD:4V2xDh+Zv/B1E+rEf48YR6JvK
Malware Config
Signatures
-
Processes:
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 677da4ccf4a11b658874f4999e0c485b_JaffaCakes118
Files
-
677da4ccf4a11b658874f4999e0c485b_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 87KB - Virtual size: 216KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Intel Co Size: 437KB - Virtual size: 437KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.themida Size: - Virtual size: 5.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Intel Co Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Intel Co Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 437KB - Virtual size: 437KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ