Static task
static1
Behavioral task
behavioral1
Sample
86483fb1b7caf16993c62fb434d86ab5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
86483fb1b7caf16993c62fb434d86ab5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
86483fb1b7caf16993c62fb434d86ab5_JaffaCakes118
-
Size
421KB
-
MD5
86483fb1b7caf16993c62fb434d86ab5
-
SHA1
5133ffae209a59e7ad8f31a8e7a162623bf1c209
-
SHA256
4b571f37a08c7752915e9f536c70bc512ec87a02735904e22af6a4a3253a23f9
-
SHA512
43cf3c68f1a1072815f2e7b6c48abfe9458cca0f74c2fcb5249cd6118bb74da1697975a6c0267153bf8c44c9e546ae2bf202e0d3e9e107b631ac7b9e2a4e095f
-
SSDEEP
6144:ojYjdPpDC2w8utJ+Vmp793F2idZecnl20lHRxp3gbncduD7yB9VCO6Sco4q8+dEC:ojgPpDC2lutf1F3Z4mxxMDqVTVOC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 86483fb1b7caf16993c62fb434d86ab5_JaffaCakes118
Files
-
86483fb1b7caf16993c62fb434d86ab5_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: - Virtual size: 320KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 93KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 312KB - Virtual size: 316KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mini9 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE