Static task
static1
Behavioral task
behavioral1
Sample
43bf54d7357cb317877ffb28ad6506de_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
43bf54d7357cb317877ffb28ad6506de_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
43bf54d7357cb317877ffb28ad6506de_JaffaCakes118
-
Size
1.9MB
-
MD5
43bf54d7357cb317877ffb28ad6506de
-
SHA1
a1a7f292872a916d62dbdf4bf3c850408cd7eacb
-
SHA256
a2810bbfd8f0539696f3d24e64129739926a32e88a684c4b55d31c00f2f91ac2
-
SHA512
537945e6f51848f155101fa24dcf52d55e449adc89424ffc078762377810ceb4d15cf8eae66c613040d4782036b47a1595f6bebd51577a69c3003d8b03ed43a2
-
SSDEEP
24576:iAFITrkGIz36Q2sbIfi71i2HNtvjexqmTEC5Nn6b6cQiSH5REzwD813Z:iCwrkVLbL1frdCYR7SbC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 43bf54d7357cb317877ffb28ad6506de_JaffaCakes118
Files
-
43bf54d7357cb317877ffb28ad6506de_JaffaCakes118.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.textbss Size: - Virtual size: 883KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 306KB - Virtual size: 305KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 1024B - Virtual size: 793B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ