Static task
static1
Behavioral task
behavioral1
Sample
0e301560df87d0250bd159180ec5af47_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e301560df87d0250bd159180ec5af47_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0e301560df87d0250bd159180ec5af47_JaffaCakes118
-
Size
497KB
-
MD5
0e301560df87d0250bd159180ec5af47
-
SHA1
d4ebe9adee927f17be2d04cd9abbfc6546f4006b
-
SHA256
f1c526cfbdaccf4e945f66972d376f1ab1756fdedfa47e6f9fbabd3d3c4b8a44
-
SHA512
753e82de2139a17c23f0f2adc0689fa92f108dda358f945312696ea365d64e142a046aba31e2480c36b820487cedea3b85043fbbf73f611b135dbae3c9c49e3b
-
SSDEEP
12288:eg8zKq4XVxlpi+cbyTAnYDKDAYbHaHjpzPhz1GZb9z+:eg8CddZMnGK0ljpz/09a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e301560df87d0250bd159180ec5af47_JaffaCakes118
Files
-
0e301560df87d0250bd159180ec5af47_JaffaCakes118.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 22KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gdata Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ