Static task
static1
Behavioral task
behavioral1
Sample
3ad1ed0b9a03349646d3698e73150317_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3ad1ed0b9a03349646d3698e73150317_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3ad1ed0b9a03349646d3698e73150317_JaffaCakes118
-
Size
729KB
-
MD5
3ad1ed0b9a03349646d3698e73150317
-
SHA1
e0a407d93244dbf81ba5a4fd27d2dc5791b16a5f
-
SHA256
be431e20db032fc4ce60609ca9a3dcb82f2a08fbf1afbdfca898a507058cc59e
-
SHA512
e872de08feb9e0afe061fe6a2d4a515fd38d3c5c499858bb89049b418f003c002c0a0cfeec18b674e4c66ce4bf8db710ee8b8df9f8a74f281554a208603a7a2b
-
SSDEEP
12288:uq7jqNmev57xoPifrPS2g2i6WdSsPKwwZ:1qNmevAATS/Z6WdSoM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ad1ed0b9a03349646d3698e73150317_JaffaCakes118
Files
-
3ad1ed0b9a03349646d3698e73150317_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 348KB - Virtual size: 348KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rrdata Size: 196KB - Virtual size: 198KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
lurdxze Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rkdelbh Size: 39KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gdwoksf Size: 4095.9MB - Virtual size: 6KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE