Static task
static1
Behavioral task
behavioral1
Sample
86644de80ff8ec6b53a23194ece74385_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
86644de80ff8ec6b53a23194ece74385_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
86644de80ff8ec6b53a23194ece74385_JaffaCakes118
-
Size
91KB
-
MD5
86644de80ff8ec6b53a23194ece74385
-
SHA1
92a093f9c6a9a52356da2778bf5cd4c8aa136d48
-
SHA256
2e1810eba97ec156d7284749b461f134efacb37f82cb52cce185f667bc2a5e9c
-
SHA512
acf58ae6bed3f61150a6cb39a7e7b1a4b6616c8a2290a39690032cd9649e25edc6625bef0728119e737c2712398b617131adf574bd08499f23a5d0d46b68ec24
-
SSDEEP
1536:r3aV7lULVLkFyKTL2QPYeLSwGnnaLM4UybpNNyq:r0cLKH2+OFnaLM4UyNNIq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 86644de80ff8ec6b53a23194ece74385_JaffaCakes118
Files
-
86644de80ff8ec6b53a23194ece74385_JaffaCakes118.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 161KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.RLD0 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.RLD1 Size: 426KB - Virtual size: 426KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 24B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RLD2 Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ