Static task
static1
Behavioral task
behavioral1
Sample
2d3329d93e20e17b9c11d9e72668a70b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2d3329d93e20e17b9c11d9e72668a70b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2d3329d93e20e17b9c11d9e72668a70b_JaffaCakes118
-
Size
1.0MB
-
MD5
2d3329d93e20e17b9c11d9e72668a70b
-
SHA1
2210a6f0d1b27d808e8e192acc531773533445cc
-
SHA256
bcd89ca2b30e6502bd6b2f6c67fdd7ffe442e10032cac9d7a788b6bb05f514f8
-
SHA512
b8ea2d19bb706ee8150d0dd4abb2e4b40a11b72f0e9ed7a4d313ee954d0ff587d14202226634fc128829c94e76724d193f5460e78520c07d4b1cdc79a3569086
-
SSDEEP
24576:Xuz2eVrPw7373zHEA6hQz4OWDjhSsJx6XIg:XkrPe373zHEA6Kz43hSsn2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d3329d93e20e17b9c11d9e72668a70b_JaffaCakes118
Files
-
2d3329d93e20e17b9c11d9e72668a70b_JaffaCakes118.exe windows:1 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 571KB - Virtual size: 571KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 8B - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yvs Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE