Static task
static1
Behavioral task
behavioral1
Sample
e8f972015f4f429160e0c607e015e84f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e8f972015f4f429160e0c607e015e84f_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e8f972015f4f429160e0c607e015e84f_JaffaCakes118
-
Size
411KB
-
MD5
e8f972015f4f429160e0c607e015e84f
-
SHA1
3913b3240bd749f541ee3628c32e50e2ec247f7b
-
SHA256
5b1eb440adb309f3774caf33235f41bb31c4e8ca621c6e4b847635ac0b6cf172
-
SHA512
e09417fd15cc845d788021fc0a95edcb880b1a9be6ed6440b1bb2043d917dce5d808ec24d9e43602a8db5324ad6e9c13e0b3a89d6f906371539e11c34c014da7
-
SSDEEP
12288:A4T3idxLM04zAm8Uv+TTHv+bya8rDQk2hyf:1T38YLzP8uizGOF0y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e8f972015f4f429160e0c607e015e84f_JaffaCakes118
Files
-
e8f972015f4f429160e0c607e015e84f_JaffaCakes118.exe windows:4 windows x86 arch:x86
ccc14f0a997760f5f8c102d0fa81e429
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowContextHelpId
LoadAcceleratorsW
EnumDisplaySettingsA
DdeReconnect
EmptyClipboard
SetParent
AdjustWindowRect
SetLastErrorEx
TileWindows
ReleaseDC
GetWindowInfo
OpenWindowStationA
TrackMouseEvent
IsIconic
DefDlgProcW
WaitForInputIdle
ScrollDC
GetDC
gdi32
GetRgnBox
PolylineTo
SetAbortProc
GetSystemPaletteUse
GetTextExtentExPointW
FillPath
DeleteMetaFile
ExtCreateRegion
CreatePenIndirect
PolyDraw
SetColorSpace
OffsetViewportOrgEx
SetICMProfileW
CreateScalableFontResourceA
GetPolyFillMode
kernel32
GetACP
GetModuleHandleA
SetEnvironmentVariableA
HeapFree
TerminateProcess
TlsGetValue
ResetEvent
FreeEnvironmentStringsA
GetStringTypeW
EnterCriticalSection
ReadConsoleW
SetHandleCount
WideCharToMultiByte
MultiByteToWideChar
HeapAlloc
GetCurrentProcess
TlsFree
GetFileType
GetStdHandle
HeapSize
GetCPInfo
SetLastError
GetStringTypeA
LeaveCriticalSection
HeapReAlloc
GetLastError
TryEnterCriticalSection
GetModuleFileNameA
VirtualFree
VirtualProtect
GetLocaleInfoW
CompareStringA
GetCurrentThread
LCMapStringA
InterlockedExchange
GetSystemInfo
VirtualAlloc
GetPrivateProfileStringA
EnumSystemLocalesA
GetTickCount
GetTimeZoneInformation
TlsAlloc
GetEnvironmentStringsW
IsBadWritePtr
GetProcAddress
VirtualQuery
GetVersionExA
GetOEMCP
GetEnvironmentStrings
LocalFlags
WritePrivateProfileSectionW
QueryPerformanceCounter
RtlUnwind
LoadLibraryA
GetDateFormatA
GetCurrentProcessId
HeapDestroy
IsValidLocale
GetCurrentThreadId
GetStartupInfoA
InitializeCriticalSection
GetUserDefaultLCID
GetTimeFormatA
LCMapStringW
TlsSetValue
IsValidCodePage
WriteFile
GetSystemTimeAsFileTime
HeapCreate
GetCommandLineA
FreeEnvironmentStringsW
UnhandledExceptionFilter
DeleteCriticalSection
ExitProcess
GetLocaleInfoA
VirtualAllocEx
CompareStringW
comdlg32
PageSetupDlgW
shell32
ShellAboutW
ShellExecuteEx
DragQueryFileAorW
SHGetDesktopFolder
Sections
.text Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 278KB - Virtual size: 278KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ