Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_657f32bef4fa5b7c9507888304200a07720296a6eb5d046111a95a1d83106fb5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_657f32bef4fa5b7c9507888304200a07720296a6eb5d046111a95a1d83106fb5.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_657f32bef4fa5b7c9507888304200a07720296a6eb5d046111a95a1d83106fb5
-
Size
743KB
-
MD5
46168c270608e1c95cde6b8f744a12e4
-
SHA1
c1e5d664ef70d272bcb6544d405c7dc949c1c2a0
-
SHA256
657f32bef4fa5b7c9507888304200a07720296a6eb5d046111a95a1d83106fb5
-
SHA512
b4475dd3f143e1e1d00d705c14ef8c4cdc48c276ef76f46808154f4965148ba33b2cbe5bd40277d3b08e433e6d0993a65593b9bed3484688dfa1e4396ee233c8
-
SSDEEP
12288:N/1tTk46QbqKYT7PCsj9wptoOgIBbh5MpUAvRfJc0dT+k9h23XBDjyPA7G:N9xn628P9j0WOgIJh5M9JcKKk95PA7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_657f32bef4fa5b7c9507888304200a07720296a6eb5d046111a95a1d83106fb5
Files
-
JaffaCakes118_657f32bef4fa5b7c9507888304200a07720296a6eb5d046111a95a1d83106fb5.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 565KB - Virtual size: 564KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 16B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ