Static task
static1
Behavioral task
behavioral1
Sample
e24dda73552c8e77cb7dd0dfe7caa261_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e24dda73552c8e77cb7dd0dfe7caa261_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
e24dda73552c8e77cb7dd0dfe7caa261_JaffaCakes118
-
Size
116KB
-
MD5
e24dda73552c8e77cb7dd0dfe7caa261
-
SHA1
c35833c8f49eaf8b24f6735390affbf1fc9ad059
-
SHA256
887cfe632ed6d446bebe8128f269a268138552944cf5d0d229feb275da068249
-
SHA512
85fb5bcee2cb5cb0552c7674d7841b6a0c651946718bde5646ce6d0ba65167ecfc64fbe7909fd564b2072de3d88e58aa3753a2d3fb16f3aeea6340a3d8252e7f
-
SSDEEP
1536:kmXwYx33kHBjTh4abD+murSKvbvZjYDATWhmKv4LDwKgEdP60W9CxwCPJ:kmAYxHkHB3+MurSKzZ2v0pdP6082
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e24dda73552c8e77cb7dd0dfe7caa261_JaffaCakes118
Files
-
e24dda73552c8e77cb7dd0dfe7caa261_JaffaCakes118.exe windows:4 windows x86 arch:x86
c7976f5b67547b28ba9a38042d12f374
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
RaiseException
GetProcAddress
ExitThread
GetOEMCP
lstrcmpiA
GlobalAlloc
GetLastError
GetVersionExA
GetModuleHandleA
CloseHandle
GetCommandLineA
lstrlenA
ExitProcess
VirtualAlloc
comctl32
ImageList_DragShowNolock
shell32
SHGetDiskFreeSpaceA
SHGetFileInfoA
gdi32
SelectObject
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerInstallFileA
advapi32
RegCreateKeyExA
RegDeleteKeyA
user32
GetClipboardData
DestroyMenu
MapVirtualKeyA
EnableWindow
DestroyWindow
RedrawWindow
EnableMenuItem
GetScrollRange
PostMessageA
ShowWindow
CharUpperBuffA
LoadKeyboardLayoutA
UnhookWindowsHookEx
EnumChildWindows
EnumThreadWindows
PtInRect
CharNextW
MessageBeep
GetMenuItemCount
AdjustWindowRectEx
UnregisterClassA
GetWindowThreadProcessId
EmptyClipboard
GetCursor
GetWindowRect
IsRectEmpty
GetDlgItem
DestroyIcon
GetKeyboardState
ScreenToClient
GetKeyboardType
SetActiveWindow
ShowOwnedPopups
SetWindowLongA
CharToOemA
SetCapture
ActivateKeyboardLayout
SetTimer
GetSysColorBrush
TrackPopupMenu
DrawMenuBar
OffsetRect
GetClassNameA
EqualRect
GetMenu
DefWindowProcA
OpenClipboard
SetMenu
GetScrollPos
IsChild
CharLowerA
LoadIconA
DestroyCursor
SetForegroundWindow
GetFocus
SendMessageW
InsertMenuA
SetWindowPlacement
DrawEdge
IsDialogMessageW
DefMDIChildProcA
SetScrollPos
InsertMenuItemA
GetWindowLongA
GetCursorPos
GetDesktopWindow
CreatePopupMenu
TranslateMessage
WaitMessage
SetWindowsHookExA
SetPropA
GetMessagePos
GetWindowLongW
MessageBoxA
ChildWindowFromPoint
CreateIcon
CallWindowProcA
WindowFromPoint
SetFocus
ReleaseCapture
GetActiveWindow
LoadBitmapA
RemoveMenu
GetSystemMenu
GetClassLongA
SetMenuItemInfoA
CharLowerBuffA
GetClassInfoA
SetScrollInfo
IsZoomed
SetCursor
LoadCursorA
BeginPaint
FillRect
RemovePropA
IntersectRect
SetWindowLongW
GetWindowPlacement
ole32
CoCreateInstanceEx
PropVariantClear
Sections
CODE Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 1024B - Virtual size: 932B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ