Static task
static1
Behavioral task
behavioral1
Sample
db0bcd1b43c409e8a54ddbd198b31549_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
db0bcd1b43c409e8a54ddbd198b31549_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
db0bcd1b43c409e8a54ddbd198b31549_JaffaCakes118
-
Size
101KB
-
MD5
db0bcd1b43c409e8a54ddbd198b31549
-
SHA1
7c5a0c5016e23daf2018d2d0354eb6cff307826c
-
SHA256
70111ddaa7d62032130275053c4f6c687eace0b4a9bc4480d229e565f101911f
-
SHA512
702a900d708a55daba72ca5cad15944e8ee3634691f1bc40ef4a7203037cf7024e42e4527b5a1d303d17d2c2edb25e7abbe41f612364c20398a052c4e8cd65df
-
SSDEEP
1536:2sh18aeWLi9cunpOQH++aBQt4K83XK4iwlNnXSrPjcUbV8Dv4:1hWSwcuUC+LBQeK4niQibKDA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db0bcd1b43c409e8a54ddbd198b31549_JaffaCakes118
Files
-
db0bcd1b43c409e8a54ddbd198b31549_JaffaCakes118.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
dfgfdjd Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
dgdsjf Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fdjfgjd Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cyclone Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cyclone Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cyclone Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cyc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ