Static task
static1
Behavioral task
behavioral1
Sample
ed2340efcacb2c12ebbd52c82c6c4260_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed2340efcacb2c12ebbd52c82c6c4260_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ed2340efcacb2c12ebbd52c82c6c4260_JaffaCakes118
-
Size
230KB
-
MD5
ed2340efcacb2c12ebbd52c82c6c4260
-
SHA1
ee84f29c36b2868556889cf1ddd8f3dbba4b4114
-
SHA256
40e799b8c94dcb862bb2c274a3b6447b377ace041f7dab8eb46352e23d4034d5
-
SHA512
3b68eee609e2cdf6b30245d1cf491ce5eb47f949a23c7bfb1fa9a5616f222d95026b0e23854395ee3f2fbfeeb3f31945d367550ea06180fb4ba5fcaf4db4ad9e
-
SSDEEP
6144:N/CW3e0dZfFgCZTdsmnEllI+R2xfVRUiu7wu64H:N91dTdxGmnOlufjBHv4H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ed2340efcacb2c12ebbd52c82c6c4260_JaffaCakes118
Files
-
ed2340efcacb2c12ebbd52c82c6c4260_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 5KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 219KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE