Static task
static1
Behavioral task
behavioral1
Sample
dc92ff4f166d38b6abeac80b5cc9af9c_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
dc92ff4f166d38b6abeac80b5cc9af9c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
dc92ff4f166d38b6abeac80b5cc9af9c_JaffaCakes118
-
Size
246KB
-
MD5
dc92ff4f166d38b6abeac80b5cc9af9c
-
SHA1
5afa2679d052c95f216f23815d683e3eb54abb09
-
SHA256
e1d20275cba70c2ea30ac11d76c96197ac5bcf192c85b9986ca3b496eb79caf5
-
SHA512
cace0022a05005531378d5f26ff1003fa543a301e63f053fcd756ab59dbf77798b0d149d2292b0f240b5a693ca94fabdb421f2a5fdb0c57383bd79887eab60bc
-
SSDEEP
6144:shvcSsx+K+v1AwmkRXcaSacztIvPAAivpmU0b6:sBZs0KYAwXcWscobvpx0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dc92ff4f166d38b6abeac80b5cc9af9c_JaffaCakes118
Files
-
dc92ff4f166d38b6abeac80b5cc9af9c_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 102KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 31KB - Virtual size: 720KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 94KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE