Static task
static1
Behavioral task
behavioral1
Sample
a3a793b84d27ff5d1eb3484b666b37bd_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a3a793b84d27ff5d1eb3484b666b37bd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a3a793b84d27ff5d1eb3484b666b37bd_JaffaCakes118
-
Size
558KB
-
MD5
a3a793b84d27ff5d1eb3484b666b37bd
-
SHA1
7adf405ce399db1bff213b952807fd1b7bbb6b69
-
SHA256
93d620a2086bdf22fb9953b38a962bc16ede0f264df682e7e628efa2f913e8cc
-
SHA512
e853c57d7c2e2cdd634e00f21598e7f8be6775acc830f1ca05305cd63f6bb2f499edd7a751264d28ac47b3340524fb21d211b43b99c94801e33830f42fb23402
-
SSDEEP
6144:vlOGQhhckLKjqWe9owgTH0nJjbxjdCfYlQWK+QpVl01p4BXVlrnj8x17RHhtVl8l:NockWGK0n9tjkYZgpVl2pCIxJpre
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a3a793b84d27ff5d1eb3484b666b37bd_JaffaCakes118
Files
-
a3a793b84d27ff5d1eb3484b666b37bd_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 465KB - Virtual size: 465KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 9KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 20B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xc Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE