Static task
static1
Behavioral task
behavioral1
Sample
Worm.SomeFool.P.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Worm.SomeFool.P.exe
Resource
win10v2004-20240802-en
General
-
Target
17ca19ca552993c56bc01cc14f79d27e_JaffaCakes118
-
Size
27KB
-
MD5
17ca19ca552993c56bc01cc14f79d27e
-
SHA1
defd7acb5282234cbd8d5c9476557be9f4059cf8
-
SHA256
7d6f96f50c704227666e673aebc1bbade1cc035f452ba22e4b12f4964bb0209f
-
SHA512
61414ef84b85b6358b75449df266e41b45237ebfae756ed2b07f89eada978749181e7679d8bcb32fb5f7460452f509ebf8a8fdd05ca5a6cd42e5c746f46ded13
-
SSDEEP
768:8RM/pInBTW0UyQ6UnsyWWttJHZtOT4Atp:86/pItW0vQ6hOt5OT4Atp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Worm.SomeFool.P.com
Files
-
17ca19ca552993c56bc01cc14f79d27e_JaffaCakes118.gz
-
Worm.SomeFool.P.com.exe windows:4 windows x86 arch:x86
87bed5a7cba00c7e1f4015f1bdae2183
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
Sections
����t Size: - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
����ta Size: 27KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
����a Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE