Behavioral task
behavioral1
Sample
e11e879f3b7cb3876f97708b3e95616c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e11e879f3b7cb3876f97708b3e95616c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e11e879f3b7cb3876f97708b3e95616c_JaffaCakes118
-
Size
254KB
-
MD5
e11e879f3b7cb3876f97708b3e95616c
-
SHA1
761b7b1add5ceafa5b7d1ccd6027dcf99723416c
-
SHA256
dbd4885caf52d7a4198c065b8ee5194c033625130fdb23d9ce0b04b9142730ee
-
SHA512
78044243d194c8315e4c3c78cc6bb30dc8f2d7e3e1117b78cd005f408eed886ed47b7962005abc286214545a5aa6e89f5f1535bdd864258fa4c89b27c14863a4
-
SSDEEP
1536:VN2hlIu8u9Ic+jsQS5qoiE9yLxlMoW95EOZA0YDCd/ZLkh/dJw1vhAimkvzugD4V:32hau8WIc+I2oi/L+HHkJ84Hys3
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e11e879f3b7cb3876f97708b3e95616c_JaffaCakes118
Files
-
e11e879f3b7cb3876f97708b3e95616c_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.code Size: 6KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 26KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 10KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 205KB - Virtual size: 208KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE