Behavioral task
behavioral1
Sample
95d20ddd0cf727e36a5010648752589e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
95d20ddd0cf727e36a5010648752589e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
95d20ddd0cf727e36a5010648752589e_JaffaCakes118
-
Size
83KB
-
MD5
95d20ddd0cf727e36a5010648752589e
-
SHA1
3afd36eb3416a0b8e93158d3173623ecd954d3a6
-
SHA256
16b95c97228bc6ccfad2509bdd241c9ab4dd1306474a78dbb72276737023b0af
-
SHA512
29af11e18d96ffe3ac89528b4bdf647dac35796125047e592752c510905ab11bfbc2aaf427e1db0f9b4e959f64614a9574d7815ab34d8efea60bc9e01063983d
-
SSDEEP
1536:gulWMTKM6rPncHqIrMggJW5QtAQac1nYzh2Dqtko1yO/MKphudRPEvUb6fPb1n:g02MecHqIniW5Qr1nahZko1ph2P+T1n
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 95d20ddd0cf727e36a5010648752589e_JaffaCakes118
Files
-
95d20ddd0cf727e36a5010648752589e_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
jj Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dd Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tt Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rr Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
bb Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE