Static task
static1
Behavioral task
behavioral1
Sample
a7f55f0be0c730432ff8926eb7420ecd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a7f55f0be0c730432ff8926eb7420ecd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a7f55f0be0c730432ff8926eb7420ecd_JaffaCakes118
-
Size
495KB
-
MD5
a7f55f0be0c730432ff8926eb7420ecd
-
SHA1
01107dadd509b8e0cd86164744f7ac5bb3182675
-
SHA256
efc6cc718344249fffb105220dce4319489fe7e5ebac81d327e4377367df5177
-
SHA512
d065dff026295a39cc6c57b682f12b7467dead9caf8e39f066d4109c0c34731e52176d81f82e786463e7b5de230b79077038f7aefe9381184f57ee3c98914bf7
-
SSDEEP
12288:j5yW1K3Dns6xN+RuCIE5B1nysP50+RDCa1d:4W4Ds6xN+v1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a7f55f0be0c730432ff8926eb7420ecd_JaffaCakes118
Files
-
a7f55f0be0c730432ff8926eb7420ecd_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 17KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
. Size: 169KB - Virtual size: 392KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.� Size: 41B - Virtual size: 41B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.� Size: 26B - Virtual size: 26B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.� Size: 41B - Virtual size: 41B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ