Static task
static1
Behavioral task
behavioral1
Sample
eaab12c6f0a3e5460394af9b22bf08e6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eaab12c6f0a3e5460394af9b22bf08e6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eaab12c6f0a3e5460394af9b22bf08e6_JaffaCakes118
-
Size
347KB
-
MD5
eaab12c6f0a3e5460394af9b22bf08e6
-
SHA1
62d1cb7a7f51a408ebd994fc3c28b8cf60ff04ee
-
SHA256
03b36de197c03f36b01f9f2cf2d596d82fc6dd6f8e4c0da5e707be948f7b45a5
-
SHA512
dbf98b330943570cc52d9a3f3ec7d6c7dd6c824dd694f1f0afbcfec589bc090382ddb9632078e818140a4e08502d1669695b0fe7687a33835e32a296402e9d19
-
SSDEEP
6144:51ErR6kJr6iJzI3G7UXVsqqDXSj6sebpbiaTNa+ew0SaL1sSQEWxwVkYHwwwkUg5:51kJ227UlIselbigNXewjc2EtVBQwPUu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eaab12c6f0a3e5460394af9b22bf08e6_JaffaCakes118
Files
-
eaab12c6f0a3e5460394af9b22bf08e6_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: - Virtual size: 606KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 5KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 20B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mao Size: 346KB - Virtual size: 348KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE