Static task
static1
Behavioral task
behavioral1
Sample
0689b1b90f5314227a09042100b130d1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0689b1b90f5314227a09042100b130d1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0689b1b90f5314227a09042100b130d1_JaffaCakes118
-
Size
283KB
-
MD5
0689b1b90f5314227a09042100b130d1
-
SHA1
d91b0b90dcc4366f08499d764f7052170905842c
-
SHA256
a19000ea7a485ae7b2f5fb6dda28677b7bb1da18f495b3bff347dfc310d1cb0e
-
SHA512
60cefcda67fe01bcca1e5a267836f82e95c79e52a2baa8955a1cf57a08d7f24e922ed745b6b978c32529b5273410d6a17435cf39d72b2f08369b3b55b6d77625
-
SSDEEP
6144:7/21+vceJ0nHrdpgG+8tmVgv2sC0rjak8Rg8RL1Q9yxTFwGBH:zk+vceJ2HfgG+26geCaZmS1Q+qGBH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0689b1b90f5314227a09042100b130d1_JaffaCakes118
Files
-
0689b1b90f5314227a09042100b130d1_JaffaCakes118.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
A Size: 207KB - Virtual size: 548KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
B Size: 7KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
C Size: 4KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
D Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
E Size: - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
F Size: 53KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.WYCao Size: 4095.8MB - Virtual size: 4095.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ