Static task
static1
Behavioral task
behavioral1
Sample
e2bae8ffad122a9a44a4bcd72bc80f22_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e2bae8ffad122a9a44a4bcd72bc80f22_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e2bae8ffad122a9a44a4bcd72bc80f22_JaffaCakes118
-
Size
192KB
-
MD5
e2bae8ffad122a9a44a4bcd72bc80f22
-
SHA1
0619d43f16a8b3813265089f3c90c11bb69d0f4d
-
SHA256
23a21691c5c3e52e45a326da2a23c1257ecb12c38a3705113d21ad16189c71ec
-
SHA512
ad1786c036a7c5ce38d8ecd75ef58353085c7d050c6b4fa0f477ee4b6ccd7d4f7d0dd93c4a601065e84299b6c21e5458dd42107f9d68ccf85782ef8be2ff58ab
-
SSDEEP
1536:fGvBaZhf2hStw2nJiIl4fTtyItbvW8sPz4eURyQmPOLHhvZe:fGEHnGhyItbvWp74eUcMLH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e2bae8ffad122a9a44a4bcd72bc80f22_JaffaCakes118
Files
-
e2bae8ffad122a9a44a4bcd72bc80f22_JaffaCakes118.exe windows:4 windows x86 arch:x86
7b781f519c7c619e9390bc7e781bf39a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
i18n
?_free_memory@I18N@@YAXPAX@Z
??0CUResBundle@I18N@@QAE@XZ
?GetItem@CUResBundle@I18N@@QAE_NPBDAAV?$TUString@D@2@@Z
?Open@CUResBundle@I18N@@QAE_NPBD0ABULOCALE@2@@Z
??1CUResBundle@I18N@@QAE@XZ
mfc42
ord800
ord2818
ord537
ord1206
ord1223
ord446
ord743
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord3738
ord815
ord561
ord5500
ord6354
ord5716
ord5717
ord2621
ord1134
ord1205
ord540
ord941
ord2725
ord5265
ord1200
ord4853
ord4998
ord4710
ord2514
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord324
ord641
ord4234
ord1576
ord1168
ord4160
ord2863
ord2379
ord755
ord470
ord4003
ord4226
ord2622
ord1799
ord614
ord290
ord3579
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord3353
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord2729
ord2730
ord6467
ord2727
ord825
ord823
ord4376
ord1146
msvcrt
_except_handler3
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
_access
_mbschr
_mkdir
_snprintf
time
localtime
__p___argc
_mbstok
_mbsicmp
_mbsstr
__p___argv
_mbsrchr
strncpy
_splitpath
_vsnprintf
rand
__CxxFrameHandler
_mbsnbcpy
_mbsnbcat
_mbslwr
_setmbcp
kernel32
MultiByteToWideChar
SetLastError
CreateThread
WaitForSingleObject
CreateEventA
InterlockedIncrement
GetModuleFileNameA
ConvertDefaultLocale
GetLastError
GetProcAddress
GetModuleHandleA
OutputDebugStringA
GetCurrentProcessId
InterlockedDecrement
CloseHandle
Module32Next
Module32First
CreateToolhelp32Snapshot
FreeLibrary
LoadLibraryA
SetEndOfFile
WriteFile
ReadFile
SetFilePointer
CreateFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetProcessTimes
GetCurrentProcess
GetCurrentThreadId
GetStartupInfoA
GetPrivateProfileStringA
user32
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
DefWindowProcA
UnregisterClassA
RegisterClassA
CreateWindowExA
SetWindowLongA
AppendMenuA
SendMessageA
LoadIconA
EnableWindow
MessageBoxA
GetSystemMenu
DestroyWindow
IsWindow
PostMessageA
ole32
CoDisconnectObject
CLSIDFromString
ws2_32
htonl
ntohl
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.. Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE