Static task
static1
Behavioral task
behavioral1
Sample
d1474a9194366668db5a0efcc69e2ce4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1474a9194366668db5a0efcc69e2ce4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d1474a9194366668db5a0efcc69e2ce4_JaffaCakes118
-
Size
3.3MB
-
MD5
d1474a9194366668db5a0efcc69e2ce4
-
SHA1
fb0504b18036caf0d2cf7839ac90fcda5e47b16f
-
SHA256
1d724bebf0c9430eb8603a49026f26ec48ea2c39932b9f833082805023d23e0c
-
SHA512
1ba32be15ad346d684ab0bd358bf254b7e3ef735f0f499e15a8b93b17c31858af3ce1cd3c6ea595ac9084cec8170b670fbd9128621365edcdad0e87fead7c167
-
SSDEEP
49152:bHeTlP2+MMzF0UaK1Nl5YN4gZCCQCM0Cla1PrIHL:bmNMA0o7YZQCM0nkr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d1474a9194366668db5a0efcc69e2ce4_JaffaCakes118
Files
-
d1474a9194366668db5a0efcc69e2ce4_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 424KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 656KB - Virtual size: 656KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mackt Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE