Static task
static1
Behavioral task
behavioral1
Sample
a11989afb7482eb4d5a6d1a7bc868edc_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a11989afb7482eb4d5a6d1a7bc868edc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a11989afb7482eb4d5a6d1a7bc868edc_JaffaCakes118
-
Size
243KB
-
MD5
a11989afb7482eb4d5a6d1a7bc868edc
-
SHA1
306adacf5a2061fde369f82241dd84a0e8de0b87
-
SHA256
4d0316622904b2fc9053efa63e3e66fac2a372e047b0a8e4fc8748f26b5df930
-
SHA512
3c896b53fcfb1d1f0050841c06e2dc549da9832a1d45a92e36343a553c44a4f3c15e26bc866459594a6261f8a4969f9c642cbdf34f55efacb3f1af739396e7ad
-
SSDEEP
6144:uCcZG6z6WleVLgiBNaDKqhiJei3A2BwN9qaTzT:0ZleiaYKKmQ2BwN9n
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a11989afb7482eb4d5a6d1a7bc868edc_JaffaCakes118
Files
-
a11989afb7482eb4d5a6d1a7bc868edc_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
Size: 167KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 520KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 13KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE