C:\Tick\Time\Win\Timer.exe
Static task
static1
Behavioral task
behavioral1
Sample
17212214cfd2f242eb9385d8874f5c4c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17212214cfd2f242eb9385d8874f5c4c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
17212214cfd2f242eb9385d8874f5c4c_JaffaCakes118
-
Size
73KB
-
MD5
17212214cfd2f242eb9385d8874f5c4c
-
SHA1
154a2388bd03890edf50096a520fe3a1b7e54d7a
-
SHA256
be6d677412c130bf906fa1cb81f098a72b70e992da607cd6c488249c2988a852
-
SHA512
f623bef7f318ad93dbc73945cfde6803335cd4137678b2be7012e090af3aa771038513bef11cfc542b1e5226b58bec93aff062fd87ec575bb44a9cfa07e638a7
-
SSDEEP
1536:d8oqTTjZVUlVw1zS3JISnutMvvAKAo0rWmTb:dyTFmw1UJ4WvJx0rWmT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17212214cfd2f242eb9385d8874f5c4c_JaffaCakes118
Files
-
17212214cfd2f242eb9385d8874f5c4c_JaffaCakes118.dll windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Sections
.wrtrf Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.fghgf Size: 512B - Virtual size: 55B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rtetr Size: 512B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.weew Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bfnhfg Size: 512B - Virtual size: 66B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wewd Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vcbvf Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ