Static task
static1
Behavioral task
behavioral1
Sample
6a9b333c8192547e65da26240e98a0ef_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6a9b333c8192547e65da26240e98a0ef_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6a9b333c8192547e65da26240e98a0ef_JaffaCakes118
-
Size
349KB
-
MD5
6a9b333c8192547e65da26240e98a0ef
-
SHA1
2b331beab17b18f62350ac68045f9d88c47d8496
-
SHA256
91828193d87985821ddfce7680e9b2fba389da28e5d0cd185653bdf15980b062
-
SHA512
dec6fbe84efc04003670e2321d05c79d05bf4e16fc0943ed0790df6adb2fa369cbed5c0b46e69a80f061ed43f2dc44f59c04e9a21851d3d2b0d159980e1ccee0
-
SSDEEP
6144:Rj8zd/rsePdV/t1j7h3rf8ZCZY4w2Kn+aCyIK3ccnMxjSLjI/Nzaj:tUs4PFh3rJ9w2KW1K3Dns+LjI/Ij
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6a9b333c8192547e65da26240e98a0ef_JaffaCakes118
Files
-
6a9b333c8192547e65da26240e98a0ef_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
Size: - Virtual size: 5.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 203KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 137KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE