Static task
static1
Behavioral task
behavioral1
Sample
371143d97c8a02f8dc814a8fc907eb24_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
371143d97c8a02f8dc814a8fc907eb24_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
371143d97c8a02f8dc814a8fc907eb24_JaffaCakes118
-
Size
557KB
-
MD5
371143d97c8a02f8dc814a8fc907eb24
-
SHA1
3818699de96f50ddfbcfdd811d104bce34ec096a
-
SHA256
bda4ce61a6565abe4b10c2e7956271ddad07e5af796adf5a166d9447ea308ebc
-
SHA512
ad944862a2f6c591166cec166ed74b7502d1ea21c15a77da4e044c8ffb59ba57398859fab185aeb41487512f53d01444211d6a0be465af00317d895735c32d1e
-
SSDEEP
12288:wXvYrL4vJKMq++LZ/mlWB7N4ZQ9baVUKWo9/TxFAHAvF+28w6wDY:wQrL0JK++LgWhWCkWmbx+UEw6kY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 371143d97c8a02f8dc814a8fc907eb24_JaffaCakes118
Files
-
371143d97c8a02f8dc814a8fc907eb24_JaffaCakes118.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 480KB - Virtual size: 480KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.stroke Size: 227KB - Virtual size: 227KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.char Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.joke Size: 512B - Virtual size: 3B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.key Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ