Static task
static1
Behavioral task
behavioral1
Sample
ea4a8e913ca409e96cd828af0a2f008d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ea4a8e913ca409e96cd828af0a2f008d_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ea4a8e913ca409e96cd828af0a2f008d_JaffaCakes118
-
Size
549KB
-
MD5
ea4a8e913ca409e96cd828af0a2f008d
-
SHA1
b5437e241b8bd975f609cc0337d60dfcc3bf5534
-
SHA256
8536a23c48d97c530cec69697022a1e7b286eb2c4b1e190b8a1235723d9da979
-
SHA512
c09559da50fbb23e0240472afe4da18680a9319987722acbf3f6979030655b6818f1f52445a1732646617320a22d9825859a14a917421291630cc41ce9bbe800
-
SSDEEP
12288:36QEEB/1/+qX4JsREKLI0dS6gjWzqLjJucd:5EEB/1/BIJFKLe6vZc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea4a8e913ca409e96cd828af0a2f008d_JaffaCakes118
Files
-
ea4a8e913ca409e96cd828af0a2f008d_JaffaCakes118.exe windows:4 windows x86 arch:x86
ad01fc0ff1985257694fef402c9d9e2f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
SetLastError
DeleteCriticalSection
GetOEMCP
GetLocaleInfoW
WriteFile
ReleaseMutex
UnhandledExceptionFilter
HeapAlloc
TlsAlloc
VirtualProtect
GetVolumeInformationW
MultiByteToWideChar
SetHandleCount
GetTickCount
GetSystemTimeAsFileTime
GetCommandLineA
WideCharToMultiByte
GetStringTypeW
GetStringTypeA
LeaveCriticalSection
QueryPerformanceCounter
LCMapStringW
CloseHandle
IsValidCodePage
GetProcAddress
FlushFileBuffers
GetPriorityClass
RtlUnwind
GetTimeFormatA
CreateDirectoryExW
GetUserDefaultLCID
LoadLibraryA
TlsFree
CompareStringA
SetConsoleMode
GetPrivateProfileStructA
LCMapStringA
GetModuleHandleA
OpenMutexA
EnumSystemLocalesA
HeapSize
InitializeCriticalSection
SetFilePointer
GetSystemInfo
GetEnvironmentStrings
IsBadWritePtr
SetConsoleOutputCP
GetFileType
HeapReAlloc
SetEnvironmentVariableA
TerminateProcess
HeapCreate
GetACP
VirtualFree
GetLastError
GetCurrentProcess
IsValidLocale
GetEnvironmentStringsW
GetModuleFileNameA
VirtualQuery
GetNumberFormatW
GetCurrentProcessId
VirtualAlloc
InterlockedExchange
GetFullPathNameA
TlsGetValue
GetTimeZoneInformation
TlsSetValue
SetStdHandle
GetDateFormatA
CreateMutexA
GetStdHandle
GetVersionExA
ExitProcess
GetCurrentThreadId
GetCPInfo
HeapFree
HeapDestroy
FreeEnvironmentStringsA
GetLocaleInfoA
GetStartupInfoA
FreeEnvironmentStringsW
CreateNamedPipeA
EnterCriticalSection
GetCurrentThread
CompareStringW
user32
CharUpperBuffW
GetUserObjectInformationA
EnumDisplayDevicesA
GetMenu
CreateWindowExW
DestroyMenu
DdeSetUserHandle
GetFocus
DestroyWindow
GetClassInfoExW
RegisterClassA
RegisterClassExA
DdeFreeStringHandle
TileWindows
GetWindowModuleFileNameA
OpenInputDesktop
UnpackDDElParam
CallNextHookEx
ChangeClipboardChain
MessageBoxA
MsgWaitForMultipleObjects
SetShellWindow
DefWindowProcA
ShowWindow
DdeClientTransaction
comctl32
InitMUILanguage
InitCommonControlsEx
ImageList_Copy
CreateStatusWindowW
comdlg32
GetSaveFileNameW
gdi32
SelectClipRgn
SelectObject
CreateFontIndirectA
ScaleViewportExtEx
EndPage
SwapBuffers
CloseMetaFile
GetGraphicsMode
BeginPath
GetOutlineTextMetricsA
wininet
FindNextUrlCacheEntryExW
advapi32
RegQueryValueExW
CryptSetProviderA
CryptSetProvParam
Sections
.text Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 255KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 105KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ