Static task
static1
Behavioral task
behavioral1
Sample
a06ba8b1b158c135cb112fb629842b09_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a06ba8b1b158c135cb112fb629842b09_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a06ba8b1b158c135cb112fb629842b09_JaffaCakes118
-
Size
19KB
-
MD5
a06ba8b1b158c135cb112fb629842b09
-
SHA1
382e414c5a3eeb9c6120e496b9932be573f3c51a
-
SHA256
430738e3b00656c564e61889cfb9dd7b4c2595b1e3c94c249bc3b16325ada4bd
-
SHA512
6b0969595b0347060f93dea05cbca54916f8991d598f4a134cee131f78fd1703739088b1217af9ba18ff7be967cc865741c671fc6c97de42ab40766067210785
-
SSDEEP
384:5JAJBeHPf/ij7m+1INDqJ8bfYJwTKaQNE3bB6by0TaDQOA:b4evf/ija+1I8Jc0wWaQCJJA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a06ba8b1b158c135cb112fb629842b09_JaffaCakes118
Files
-
a06ba8b1b158c135cb112fb629842b09_JaffaCakes118.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
.text Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 21KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ