Static task
static1
Behavioral task
behavioral1
Sample
d33fd608c6f82ca2690ae61daf895fd5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d33fd608c6f82ca2690ae61daf895fd5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d33fd608c6f82ca2690ae61daf895fd5_JaffaCakes118
-
Size
423KB
-
MD5
d33fd608c6f82ca2690ae61daf895fd5
-
SHA1
ec7422dc66615e201d44c9dbbc64bce5dbbff45a
-
SHA256
6b44ac7bae468dacf658b7517ac1791e2470b8b6d25ea08fe1882ecdcd4697d2
-
SHA512
da5311e9953bd82b968c75395a33d37d5ef08ce3882268bf1e387d0f632dd0b54cfdf741f1bd472bca0d3bde6a3e123fda4a1d019a52587e5070fe735313c30a
-
SSDEEP
12288:fK/lGRgOUqmq9kR6lhKX5iAjVs8qKkFmBau:fK/cRgOnmq9g6UHVsVF0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d33fd608c6f82ca2690ae61daf895fd5_JaffaCakes118
Files
-
d33fd608c6f82ca2690ae61daf895fd5_JaffaCakes118.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 9KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 410KB - Virtual size: 412KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE