Static task
static1
Behavioral task
behavioral1
Sample
db4fe39ed4e4d847b19591bd159c1c0e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db4fe39ed4e4d847b19591bd159c1c0e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
db4fe39ed4e4d847b19591bd159c1c0e_JaffaCakes118
-
Size
255KB
-
MD5
db4fe39ed4e4d847b19591bd159c1c0e
-
SHA1
8f81c5a04a80982ceeb14ddf52f79b2c5cc89145
-
SHA256
d50f59a186b25fc3ccf88c32cb9ccb14683f328dabbea9726e86081917a65a62
-
SHA512
dff777b155487ea963fc6dd1916a431c62a000d5c5cc7932c3da22bda06438744eb0b50b5a61b8706d5eb6d0c9e655ae7db6d6a16736af7d41d68cd1afd85983
-
SSDEEP
3072:HLbYH3gPi0Z1960YBpFmUvQ7NQpU/eeEkdMgMtwXbR7TUJeKce/GYKLv32U2RweH:Pi9tBpgXNQa/edgLR7YcKRKLfyID4ncY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db4fe39ed4e4d847b19591bd159c1c0e_JaffaCakes118
Files
-
db4fe39ed4e4d847b19591bd159c1c0e_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Zafer Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Zafer Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Zafer Size: - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Zafer Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Zafer Size: - Virtual size: 3.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Zafer Size: 596KB - Virtual size: 596KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Dertman Size: - Virtual size: 6.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE