Static task
static1
Behavioral task
behavioral1
Sample
ea41095eb4a0d8e4877206d3483d356b_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ea41095eb4a0d8e4877206d3483d356b_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ea41095eb4a0d8e4877206d3483d356b_JaffaCakes118
-
Size
751KB
-
MD5
ea41095eb4a0d8e4877206d3483d356b
-
SHA1
866119a84aad98418d1e3ce1b35078a6f608b632
-
SHA256
cf6b262e055954a3de8d36e1aba05cc180c5f4ce55b00df8673ce7765a5db64d
-
SHA512
0113214f240533a23cdb654125ab4e8d3bc7b9a529dea1fcf7b6b2a82250b35575def924a79a79200c6ee2109f26325ade878f10b2d8eb215b94da44836be361
-
SSDEEP
12288:b8IbAz6Onx/OENlePxF/aXRK9J1hGVwV02WMhJaXuup4jwKS58esdtI8TuU6VCwI:hbAzRrfeb/5TGVwa2WMm++46ybIqYI0Q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea41095eb4a0d8e4877206d3483d356b_JaffaCakes118
Files
-
ea41095eb4a0d8e4877206d3483d356b_JaffaCakes118.exe windows:4 windows x86 arch:x86
7289f96427e6eccf29ace90a47df7ea5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetForegroundWindow
DispatchMessageA
GetDC
ReleaseDC
DestroyWindow
GetParent
ShowWindow
EnableWindow
TranslateMessage
LoadStringA
EnableMenuItem
RegisterClassA
GetSubMenu
SetTimer
SetFocus
BeginPaint
KillTimer
GetSystemMetrics
GetWindowRect
ReleaseCapture
SetWindowLongA
SetWindowTextA
GetWindowLongA
ScreenToClient
LoadCursorA
LoadIconA
GetDesktopWindow
EndDialog
MoveWindow
MessageBoxA
DialogBoxParamA
SendMessageA
GetClientRect
SetCursor
kernel32
CreateFileA
GetStdHandle
GetFileAttributesA
WaitForSingleObject
LockResource
FindFirstFileW
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
LocalAlloc
SetFilePointer
WideCharToMultiByte
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
GetStringTypeW
SetEvent
LocalFree
FormatMessageW
InitializeCriticalSection
LoadResource
FindClose
TlsGetValue
FormatMessageA
SetLastError
GetEnvironmentVariableA
FlushFileBuffers
GetModuleFileNameA
LoadLibraryExA
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
CreateEventW
GetCurrentThread
GetTickCount
GetCommandLineA
GetCurrentThreadId
GetLastError
GetVersion
GetCurrentProcessId
GetModuleHandleA
ExitProcess
VirtualAlloc
GetOEMCP
Sleep
CreateProcessW
HeapCreate
SetStdHandle
GetModuleHandleW
GetACP
CloseHandle
ReadFile
RaiseException
InterlockedCompareExchange
HeapSize
SizeofResource
VirtualQuery
GlobalUnlock
GetEnvironmentStringsW
LCMapStringA
lstrlenA
LCMapStringW
LeaveCriticalSection
TlsSetValue
GetFileType
CreateEventA
CreateFileW
GetTimeZoneInformation
GlobalLock
FindNextFileA
FindNextFileW
CompareStringW
GetProcessHeap
GetProcAddress
DeleteFileA
GetFileSize
GetStartupInfoA
LoadLibraryA
GetVersionExA
TlsAlloc
QueryPerformanceCounter
FreeLibrary
LoadLibraryW
EnterCriticalSection
HeapFree
InterlockedIncrement
SetEndOfFile
GlobalAlloc
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
SetUnhandledExceptionFilter
Sections
.text Size: 711KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ