Static task
static1
Behavioral task
behavioral1
Sample
eb344cdb52650ecec58bd125b7dfb96c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eb344cdb52650ecec58bd125b7dfb96c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb344cdb52650ecec58bd125b7dfb96c_JaffaCakes118
-
Size
104KB
-
MD5
eb344cdb52650ecec58bd125b7dfb96c
-
SHA1
635dbb868e4109d1b0aae71cf7fe2ef0d68bd87d
-
SHA256
2fa7765492741497385ca0887840c3e1612cacf15f3edfd5f9b3a92e13c6e945
-
SHA512
e74d33f81be228a9d303712be0d9ad220e4821ae2d54dcf55c0df5e595fbb111009877a1fa3d4e98c57ad81ce7cd4516bb2d30176f1798b146bf3a6bf3d7ee95
-
SSDEEP
1536:vjK9sCIFBQWWmDkrJvO9nBVRLrKx69CW9zYLX3DpaolkMXF:7xCVWPDkrgGZL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb344cdb52650ecec58bd125b7dfb96c_JaffaCakes118
Files
-
eb344cdb52650ecec58bd125b7dfb96c_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.rety Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.retr Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.uytr Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hgty Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tesf Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE