Behavioral task
behavioral1
Sample
d1099b056f4af1a89b185eed9bcb39b6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1099b056f4af1a89b185eed9bcb39b6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d1099b056f4af1a89b185eed9bcb39b6_JaffaCakes118
-
Size
93KB
-
MD5
d1099b056f4af1a89b185eed9bcb39b6
-
SHA1
28d9495460bc2b8388c65b69dd432b43441c6fcd
-
SHA256
571e8ffe4ef994dd58999d94428048b5cde32856f1cf41f8aa481a154b89a0f9
-
SHA512
9e4d1def8c283cf8fab890c07b3af312404dc97a5dbb05ca95f9190b032f42ccb36beeae337e4f3262629856acaa72ce5a0893924fd76f35162d787c2be15bdf
-
SSDEEP
1536:wCbpk0SQuuYozaI6AINjoK97d3RGcVI0N5jVQcLmvOoPYVNVrsBH5/Mc48qk:wCktrozPPINoKpd3RGs3mPPY7tSZW8l
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d1099b056f4af1a89b185eed9bcb39b6_JaffaCakes118
Files
-
d1099b056f4af1a89b185eed9bcb39b6_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 6KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 68KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE