Static task
static1
Behavioral task
behavioral1
Sample
e0c542b93739343e2dfbeae601ccef4b_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e0c542b93739343e2dfbeae601ccef4b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e0c542b93739343e2dfbeae601ccef4b_JaffaCakes118
-
Size
258KB
-
MD5
e0c542b93739343e2dfbeae601ccef4b
-
SHA1
c10ba5b48548a4f51859dfdd080c0e8389169bb6
-
SHA256
13985bfb2d8389b8fae9f330221f9d8cea1af24366fd63dbd30c79e08bb61afe
-
SHA512
e4495bc5d15bee2931fc402d98b2f973393a0f34171a3637052ba87dc39856fc76aca97d9cc3ca98c32e28b2e07eaa7ac256a655901a231f3ad78922c2fd9a3c
-
SSDEEP
6144:w1fM3iqhdBCkWZQhO/SFlCRXTLgynXh9tU:eMpTBqGO6ylU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e0c542b93739343e2dfbeae601ccef4b_JaffaCakes118
Files
-
e0c542b93739343e2dfbeae601ccef4b_JaffaCakes118.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Sections
Size: 28KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 225KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 962B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE