Static task
static1
Behavioral task
behavioral1
Sample
fb77375c78c6734eb62eb4a62600819d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb77375c78c6734eb62eb4a62600819d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fb77375c78c6734eb62eb4a62600819d_JaffaCakes118
-
Size
576KB
-
MD5
fb77375c78c6734eb62eb4a62600819d
-
SHA1
31a6904ec055680d00fced0dad27721ca548ccd6
-
SHA256
7b2c4152e7f34629ca5a88a68e9ea284d93fa758ade8f9c84d79d344a410bbba
-
SHA512
f56707cca9506293c80f2eb0e6df6f2286210a8ea97d52fbc857fcebcb3d565b788ecae2f44153e9435bd5e2773d242352a0c7a0a137d7a32a27db60aeb98816
-
SSDEEP
12288:K5azkDX4X+dUvS3NRK/lGRgOUqmq9kR6lhKX2z7h+zS5sv:S2MGQK/cRgOnmq9g6PoSo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb77375c78c6734eb62eb4a62600819d_JaffaCakes118
Files
-
fb77375c78c6734eb62eb4a62600819d_JaffaCakes118.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 153KB - Virtual size: 348KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 47KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 366KB - Virtual size: 368KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE