Static task
static1
Behavioral task
behavioral1
Sample
6ae48436cfc4053df3e7e223f6649cc0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6ae48436cfc4053df3e7e223f6649cc0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6ae48436cfc4053df3e7e223f6649cc0_JaffaCakes118
-
Size
572KB
-
MD5
6ae48436cfc4053df3e7e223f6649cc0
-
SHA1
a013897aacf613b225cf494533f178f19aa9d9e4
-
SHA256
c3e1b83a3d15e13c20a5693b800aa5b26e74c6e5695d1520c014c7f1c6e0ef04
-
SHA512
c748210445c171b8d73541740643fa575e7bc72a46e22431e820d95e7c5afe1b48139b1890cb9c940f3f4db3a5e82c241fc91a16a376d2a53f3b3bc274579470
-
SSDEEP
12288:1h36h8IZ5dJIMdrPXPshZ47+PmFOc5cAXAsxFnQyG7NxSI/:X6OIrdJIMlA47YmwcaofFnlWN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6ae48436cfc4053df3e7e223f6649cc0_JaffaCakes118
Files
-
6ae48436cfc4053df3e7e223f6649cc0_JaffaCakes118.exe windows:4 windows x86 arch:x86
eee9062b8cbe1efb89c250150605b1a4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
FatalExit
Sections
CODE Size: 468KB - Virtual size: 468KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 10KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 20B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ccp3p Size: 8KB - Virtual size: 8KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE