Static task
static1
Behavioral task
behavioral1
Sample
fa508aaa9cab919cbebc987747083951_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa508aaa9cab919cbebc987747083951_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fa508aaa9cab919cbebc987747083951_JaffaCakes118
-
Size
61KB
-
MD5
fa508aaa9cab919cbebc987747083951
-
SHA1
2883a38ab917089affc6fd6afeebd61d8ca6885f
-
SHA256
9198e520adc38f13a0983726f8aba2df55e651d1b8d7fbb16503e8bbc89b4bab
-
SHA512
8735e0e0f8634384b1b1602eccdacf6e657115c990bf91edf072bdc20a9e6757294ebe5a259c88346a148309c3ba80c9a85641f327ec9821c8cd52b6c54b202c
-
SSDEEP
1536:DC+De1d2I2x///X/YWaPJKUeyCRqi+nVjeBOYQ68P2:DC+De1d2IU///X/zYhnsrQ68P2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fa508aaa9cab919cbebc987747083951_JaffaCakes118
Files
-
fa508aaa9cab919cbebc987747083951_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 50KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xiaohui Size: 17B - Virtual size: 17B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xiaohui Size: 67B - Virtual size: 67B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ