Behavioral task
behavioral1
Sample
b31629a0dfe04a10f9bf11e3d5665ce5_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b31629a0dfe04a10f9bf11e3d5665ce5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b31629a0dfe04a10f9bf11e3d5665ce5_JaffaCakes118
-
Size
1.0MB
-
MD5
b31629a0dfe04a10f9bf11e3d5665ce5
-
SHA1
39722a30a54b067457a8ee160c4902999e256ac7
-
SHA256
d2939651c676a8c37e34b27a624b849e796e46b0b7b890d50363be7f269fa2a6
-
SHA512
c30992bd7212c51cde41c43c9f2fad02651c7cfa85ac8f972a2b9129394faaf2f908b209942eb1973fa848cc6287e8294b8bf9d17cd41cbf3fbbbb084e0bf4d3
-
SSDEEP
24576:Z74X5N8qYfODJfE/sjczKDLPQg5zJP81e3blyi:Z7sNnYvQcu
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b31629a0dfe04a10f9bf11e3d5665ce5_JaffaCakes118
Files
-
b31629a0dfe04a10f9bf11e3d5665ce5_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 550KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 81KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 10KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc0 Size: 59KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 350KB - Virtual size: 349KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE