Behavioral task
behavioral1
Sample
1102ad4de8ef116576886ce38ff93f69_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1102ad4de8ef116576886ce38ff93f69_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1102ad4de8ef116576886ce38ff93f69_JaffaCakes118
-
Size
54KB
-
MD5
1102ad4de8ef116576886ce38ff93f69
-
SHA1
e87b787363b9e953c68a3c475232b330a427cd81
-
SHA256
ceffc9a6f136a3f7d0c78a7ecd6639c19b18da35b896378d32f53fcff6a66b4f
-
SHA512
2b6f84d0be95e3e78d1585ddbfa5f2fa22172cb720d0c0c9a4e73e7a1338f4d52b91c4423ffb08b2de2a763891d9b94c60d9f3023b276e6465a6d250781b070e
-
SSDEEP
768:kWHg5EDGS4ILnICjOGffj1dU31oZg6WR+nFXfbs4nDNLCIMRZicWvGsxibPr2AQ:kegMLljOgO3eCibs4nMkcWvyaz
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1102ad4de8ef116576886ce38ff93f69_JaffaCakes118
Files
-
1102ad4de8ef116576886ce38ff93f69_JaffaCakes118.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 36KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE