Static task
static1
Behavioral task
behavioral1
Sample
a37d0e3a650efb6f70c1e7549ab04bdc_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a37d0e3a650efb6f70c1e7549ab04bdc_JaffaCakes118
-
Size
136KB
-
MD5
a37d0e3a650efb6f70c1e7549ab04bdc
-
SHA1
690680f33d1a38cb5b988e627f270ccb8742d637
-
SHA256
838d31471a048551573073874ec56f54d5101659b0f51ad5b77a1395f3417f58
-
SHA512
2f60bb9a3803237f4447d9721abb05fa03a235255d36330828fa807bb5092d55e9ac8eecb7fbd0311f160bfd368d1f4f473fee90d124009575aea8f59b59c322
-
SSDEEP
3072:zjsVoJuZoJ3eF9yhR5ejbeZLF+YPpQZ/jG+vSCDvGjkoMW:+oUoJObMR5ejSFFNpwpvLDejkoMW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a37d0e3a650efb6f70c1e7549ab04bdc_JaffaCakes118
Files
-
a37d0e3a650efb6f70c1e7549ab04bdc_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.text Size: 22KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 69KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.���YY Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
. Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.s+�1� Size: 26B - Virtual size: 26B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tX��� Size: 38B - Virtual size: 38B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.(&�0� Size: 41B - Virtual size: 41B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ