Static task
static1
Behavioral task
behavioral1
Sample
7207054fa89fc5db67a11bd24dd55bf4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7207054fa89fc5db67a11bd24dd55bf4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7207054fa89fc5db67a11bd24dd55bf4_JaffaCakes118
-
Size
367KB
-
MD5
7207054fa89fc5db67a11bd24dd55bf4
-
SHA1
8e4d3b5e43e9443679623875d4b40bdaad47a8c5
-
SHA256
3561b840bf0dda1de630c7e021f13b4607caedf4ecdd09992b1bc0d770897fc7
-
SHA512
eb238622a50d033c0e458fa066ada4d610259cd388553d68c3b89c8e31e581be6797f6e8216d542204786af26d6795c8681e57edc95f5a389b1ad27eff40286a
-
SSDEEP
6144:sZ7nQFz6GlPv6GJI+Ohz5nwJkoGzw16miaOptZFcBvN/:sZbAFPvbRORhwZKw16UOpFc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7207054fa89fc5db67a11bd24dd55bf4_JaffaCakes118
Files
-
7207054fa89fc5db67a11bd24dd55bf4_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: - Virtual size: 644KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 7KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 20B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 35B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adong Size: 366KB - Virtual size: 368KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE