Static task
static1
Behavioral task
behavioral1
Sample
e97e8261774614aed05f51966071c5a8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e97e8261774614aed05f51966071c5a8_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e97e8261774614aed05f51966071c5a8_JaffaCakes118
-
Size
49KB
-
MD5
e97e8261774614aed05f51966071c5a8
-
SHA1
9718e662fd30e53326f9d639afb418b1f8ba86d2
-
SHA256
639bd552dc78d3f1aa231a20da7ab3a4e00b93365d9a32a5bcaea62c4eb809d7
-
SHA512
a1de61641575fef1a31b4b5561bbe1cb13d17d2869df598cd92f886b03df726b0e58cc26d97a636f728425220be5702f04327d669f7650530a0c1bba8f3b0a25
-
SSDEEP
1536:cO4XT5Jk5I7hS+h+ww2icQQPbfqqIAD+6U:c9Xnn7vIvmbiGD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e97e8261774614aed05f51966071c5a8_JaffaCakes118
Files
-
e97e8261774614aed05f51966071c5a8_JaffaCakes118.exe windows:5 windows x86 arch:x86
b2b3d824d355e7296e44bc5128eddd6d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessTimes
GetLogicalDrives
ReadFile
WriteProcessMemory
CreateFileMappingW
GetModuleFileNameW
SetEndOfFile
CreateDirectoryW
GetTempPathW
CreateMutexW
HeapReAlloc
lstrcpyW
Sleep
WideCharToMultiByte
FindNextFileW
GetSystemTime
IsBadReadPtr
lstrcpynW
DeleteFileW
GetTickCount
WaitForSingleObject
GetFileSize
GetFileTime
lstrcpyA
FindClose
SetFilePointer
CreateProcessW
GetTempFileNameW
SetThreadPriority
FlushFileBuffers
GetTimeZoneInformation
InitializeCriticalSection
MoveFileExW
SetFileTime
GlobalLock
CreateEventW
LeaveCriticalSection
HeapAlloc
GetSystemTimeAsFileTime
ExpandEnvironmentStringsW
SystemTimeToFileTime
GetLastError
CreateThread
CloseHandle
lstrcatA
lstrcmpiW
HeapFree
UnmapViewOfFile
ReleaseMutex
MapViewOfFile
CopyFileW
WriteFile
FindResourceW
GetComputerNameW
MultiByteToWideChar
GetExitCodeProcess
OpenProcess
DisconnectNamedPipe
ResetEvent
GetVersionExW
GlobalUnlock
GetCurrentProcessId
lstrcatW
CreateFileW
GetUserDefaultUILanguage
GetFileSizeEx
lstrlenA
GetModuleFileNameA
SetFileAttributesW
lstrcmpiA
OpenMutexW
GetThreadPriority
lstrlenW
SetEvent
GetLocalTime
GetCurrentThreadId
GetProcessHeap
FindFirstFileW
SetLastError
GetDriveTypeW
GetModuleHandleA
EnterCriticalSection
GetCommandLineA
user32
SendMessageW
GetIconInfo
GetDlgItemTextW
PeekMessageA
CloseDesktop
ExitWindowsEx
GetWindowLongW
GetClipboardData
Sections
.ahmr Size: 39KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kbmjwz Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jkt Size: 7KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ