Static task
static1
Behavioral task
behavioral1
Sample
e78013e1bc912bd3f7a44b1013c94dc7_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
e78013e1bc912bd3f7a44b1013c94dc7_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e78013e1bc912bd3f7a44b1013c94dc7_JaffaCakes118
-
Size
23KB
-
MD5
e78013e1bc912bd3f7a44b1013c94dc7
-
SHA1
63d257b415f230a7356d0e94dc5bb8ed23f8d00f
-
SHA256
4f8f55bf4c1f43b24a2b0dd4b05d95b99d43188cc71619dda39ec4d040219535
-
SHA512
c2ad36e475a7ef7fd552a29f35afbb7a169073a90bca0b72d12f5ae0a710729fd1a351bccf978da513f498fc57a23f7b13a8abed53e5783cf15d9560e1e0abbd
-
SSDEEP
192:/tSivept6aOaR0+mDKoAI9v/VbOjnmhO42yZaaQTxU8b6rNHnEI29ER8JyoEX24a:kzRA/XDvfSb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e78013e1bc912bd3f7a44b1013c94dc7_JaffaCakes118
Files
-
e78013e1bc912bd3f7a44b1013c94dc7_JaffaCakes118.exe windows:4 windows x86 arch:x86
f247b35f56f64ddcb24a6ee389d8943a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Process32Next
Process32First
CreateToolhelp32Snapshot
CloseHandle
OpenProcess
GetProcAddress
LoadLibraryA
GetLastError
Sleep
SetUnhandledExceptionFilter
GetCurrentProcess
CreateSemaphoreA
GetCurrentThreadId
CreateThread
lstrlenW
WideCharToMultiByte
GetModuleHandleA
user32
GetMessageA
PostThreadMessageA
GetInputState
wsprintfA
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
ole32
CoCreateInstance
CoInitialize
oleaut32
SysFreeString
VariantClear
wininet
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetCloseHandle
InternetOpenA
msvcrt
_strlwr
memset
memcpy
??3@YAXPAX@Z
__CxxFrameHandler
_stricmp
_onexit
??2@YAPAXI@Z
strlen
__dllonexit
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE