Static task
static1
Behavioral task
behavioral1
Sample
e5c902dd91723242bdf7afdadc5888e7_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e5c902dd91723242bdf7afdadc5888e7_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e5c902dd91723242bdf7afdadc5888e7_JaffaCakes118
-
Size
199KB
-
MD5
e5c902dd91723242bdf7afdadc5888e7
-
SHA1
e27102cf367e6439be73349f27f8b23278f0b9a0
-
SHA256
4153ef4d808ef701a408ac91ff853336c21947b0581b0804de933b53cc74e990
-
SHA512
487f3646cad76e3f863d78b4d6f2cd7c382f2d9dc75eaadfcafb44739a43b09f6dee1b493476f4c76b32733cd3c4795709c5ab70ca2a4a9e422ad2bdd4ff5665
-
SSDEEP
6144:StMhbwpYm+Piiz5XTPAzdelUOoptq+ZbcnqWS9:RxwMiizxTPAzEUxbB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource e5c902dd91723242bdf7afdadc5888e7_JaffaCakes118
Files
-
e5c902dd91723242bdf7afdadc5888e7_JaffaCakes118.exe windows:5 windows x86 arch:x86
159301adde56a72ec1a6b346a6f25103
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
mp43xl32
_FNan
_FDscale
_FInf
_LEps
_FDnorm
_Eps
_LExp
_LDenorm
_FDenorm
_FXbig
ntdll
NtOpenEventPair
NtQueryDirectoryFile
ZwQueryInformationThread
NtOpenFile
NtClearEvent
NtOpenMutant
NtCreateSection
NtLockFile
NtOpenDirectoryObject
NtQueryInformationFile
NtCreateMutant
user32
DrawTextA
CallWindowProcW
SetWindowPos
SetWindowsHookExW
SetMenuItemInfoW
GetSysColorBrush
GetWindow
LockWindowUpdate
SetCapture
DrawTextW
PeekMessageW
GetCapture
UnregisterClassA
MonitorFromPoint
SendMessageA
GetKeyState
DestroyWindow
DialogBoxParamW
SetWindowLongW
TrackPopupMenuEx
GetWindowThreadProcessId
CharLowerW
IsWindow
RegisterClassExW
DestroyMenu
InflateRect
kernel32
WideCharToMultiByte
FindFirstFileW
FindFirstVolumeW
FindNextVolumeW
GetModuleHandleW
GetACP
InterlockedIncrement
SleepEx
SetLastError
MultiByteToWideChar
CloseHandle
GetModuleHandleA
DeleteFileW
ReadDirectoryChangesW
GetFullPathNameW
GetVersion
GetCurrentProcessId
GlobalAlloc
InterlockedDecrement
GetProcessHeap
GetTickCount
HeapSize
ExitProcess
GlobalLock
CloseHandle
GetPriorityClass
VirtualAlloc
GetCurrentProcessId
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 138KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ