Static task
static1
Behavioral task
behavioral1
Sample
eaf1ab7f1d85e54898838614c8e1dfe7_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eaf1ab7f1d85e54898838614c8e1dfe7_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
eaf1ab7f1d85e54898838614c8e1dfe7_JaffaCakes118
-
Size
693KB
-
MD5
eaf1ab7f1d85e54898838614c8e1dfe7
-
SHA1
cf7b3eec470e49777d1439a62dce2567a0e84806
-
SHA256
04c5b2392afffb2ab061218a8789a82bc09e5a936580f62746698cd426099ee7
-
SHA512
1df0842c39def0477a10d0150105a62bdbba2b2c2fa0c09f5f0617591fa182d8da1e54e3df33eff08f3cdef7badd3474fb36258cbfe61d527f684a04f0c716f7
-
SSDEEP
12288:Dasa6CvqRxpeN5iMQmCg6xIfFQAARfa1qrQMbOH5AYyp+t2ijYdT9AKDVf:esvQoxpeSn3iqRfa1q0Mu5Af+vWJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eaf1ab7f1d85e54898838614c8e1dfe7_JaffaCakes118
Files
-
eaf1ab7f1d85e54898838614c8e1dfe7_JaffaCakes118.exe windows:4 windows x86 arch:x86
0d1279158ff5438f14fd6030302ba41d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
user32
CharPrevW
SetWindowsHookExW
BringWindowToTop
GetMessageExtraInfo
SetMenuDefaultItem
MenuItemFromPoint
ChangeClipboardChain
LockWindowUpdate
ReuseDDElParam
GetKeyboardLayoutNameA
RegisterClassExA
RegisterClassA
kernel32
GetOEMCP
WideCharToMultiByte
WriteConsoleA
GetEnvironmentStrings
HeapFree
OpenMutexA
LCMapStringW
ExitProcess
DeleteCriticalSection
VirtualAlloc
DebugBreak
GetTimeZoneInformation
GetTickCount
LocalSize
EnumSystemLocalesA
HeapAlloc
GetModuleHandleA
CreateFileA
InterlockedExchange
HeapCreate
LoadLibraryW
GetProcessHeap
GetCurrentThreadId
GetTimeFormatA
GetUserDefaultLCID
HeapValidate
CreateMutexA
SetHandleCount
TlsSetValue
MultiByteToWideChar
TerminateThread
WriteConsoleW
WriteConsoleOutputA
WriteConsoleOutputW
GetStartupInfoA
OutputDebugStringA
RaiseException
LeaveCriticalSection
TlsAlloc
SetFilePointer
GetConsoleOutputCP
GetVersionExA
GetSystemTimeAsFileTime
SetLastError
GetCurrentProcessId
HeapDestroy
InitializeCriticalSection
GetConsoleCP
FlushFileBuffers
SetStdHandle
InterlockedDecrement
UnhandledExceptionFilter
GetEnvironmentStringsW
GetCommandLineW
GetFileType
GetModuleFileNameA
FreeLibrary
GetStringTypeA
GetLocaleInfoA
FreeEnvironmentStringsA
GetStringTypeW
ReadFile
GetCommandLineA
GetACP
LoadLibraryA
lstrlenA
GetModuleFileNameW
GetProcAddress
CloseHandle
GetCurrentThread
VirtualFree
FreeEnvironmentStringsW
TlsFree
GetDateFormatA
OutputDebugStringW
WriteFile
SetConsoleCtrlHandler
GetCPInfo
HeapReAlloc
RtlUnwind
IsDebuggerPresent
GetLocaleInfoW
GetDriveTypeA
GetStartupInfoW
SetEnvironmentVariableA
CompareStringA
EnterCriticalSection
LCMapStringA
IsValidLocale
lstrcpyA
CreateToolhelp32Snapshot
GetLastError
GetProfileSectionA
GetCurrentProcess
SetUnhandledExceptionFilter
TlsGetValue
VirtualQuery
IsBadReadPtr
InterlockedIncrement
GetStdHandle
QueryPerformanceCounter
CompareStringW
IsValidCodePage
TerminateProcess
GetConsoleMode
Sections
.text Size: 319KB - Virtual size: 318KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 317KB - Virtual size: 316KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ