Static task
static1
Behavioral task
behavioral1
Sample
e26103797b279fa12b40a6adb487af6c_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e26103797b279fa12b40a6adb487af6c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e26103797b279fa12b40a6adb487af6c_JaffaCakes118
-
Size
172KB
-
MD5
e26103797b279fa12b40a6adb487af6c
-
SHA1
314e602348f22f951bfeedf672148210f9d7d355
-
SHA256
eb0be6bc2c7b73421158f7345d6855d3b1e5e63df448fab978c6207d498f18cd
-
SHA512
99bf9f319fac7eb3c406f52e3af982008d3430475667e93c1b09d780b18f4b0342c7422cdd82e881bd1ca9e6b2f7c541fe08bdd023fd19f8a238ec5415f46efe
-
SSDEEP
3072:D0uDriu7OvApH7ENFn33Wm9gj5CgmJ6ndtedzRefnW3jsXa3ch:D0uD1DR7W3Wm9E5CgmSKs+3jsX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e26103797b279fa12b40a6adb487af6c_JaffaCakes118
Files
-
e26103797b279fa12b40a6adb487af6c_JaffaCakes118.exe windows:4 windows x86 arch:x86
204803378cff042f706299d56a89044e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_Write
ImageList_Read
ole32
CreateBindCtx
MkParseDisplayName
shell32
SHGetFileInfoA
SHGetFolderPathA
user32
GetSubMenu
GetWindow
EnumChildWindows
GetMessagePos
GetSysColor
GetCapture
IsChild
BeginPaint
GetCursor
GetClipboardData
DeferWindowPos
GetActiveWindow
IsWindowEnabled
EqualRect
GetPropA
GetScrollRange
GetMenuStringA
CharToOemA
GetMenuState
ShowScrollBar
GetSysColorBrush
GetScrollInfo
GetMenuItemID
GetDesktopWindow
DrawMenuBar
GetWindowTextA
GetClassLongA
GetMenuItemInfoA
GetKeyNameTextA
GetScrollPos
GetDlgItem
CreateWindowExA
GetParent
shlwapi
SHDeleteValueA
PathIsDirectoryA
SHGetValueA
SHStrDupA
SHSetValueA
SHEnumValueA
SHQueryValueExA
PathGetCharTypeA
PathIsContentTypeA
comdlg32
GetSaveFileNameA
kernel32
VirtualQuery
lstrcpynA
FreeLibrary
GlobalDeleteAtom
Sleep
lstrcpyA
InitializeCriticalSection
GetStdHandle
MulDiv
SizeofResource
LockResource
FindResourceA
DeleteFileA
FormatMessageA
GetSystemDefaultLangID
lstrcmpiA
SetEndOfFile
GetDiskFreeSpaceA
ResetEvent
GetFileType
LoadResource
HeapAlloc
CreateFileA
GetACP
SetHandleCount
GetModuleFileNameA
GetCommandLineA
MoveFileExA
GlobalFindAtomA
GlobalAddAtomA
VirtualAlloc
GetLocalTime
VirtualFree
SetLastError
SetFilePointer
lstrcmpA
GetCPInfo
EnumCalendarInfoA
GetCurrentThreadId
lstrcatA
LocalReAlloc
ReadFile
EnterCriticalSection
HeapDestroy
SetEvent
GetEnvironmentStrings
FindClose
HeapFree
WaitForSingleObject
GetTickCount
VirtualAllocEx
LocalAlloc
CreateThread
GetCurrentProcessId
GetModuleHandleA
CompareStringA
GetStartupInfoA
ExitProcess
GetFileAttributesA
SetErrorMode
LoadLibraryExA
GetVersionExA
GetLastError
msvcrt
strcmp
calloc
atan
memmove
memcpy
Sections
CODE Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 119KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 603B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ