Static task
static1
Behavioral task
behavioral1
Sample
eaf4a376b4dd542fa7c63429ade03a1c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eaf4a376b4dd542fa7c63429ade03a1c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
eaf4a376b4dd542fa7c63429ade03a1c_JaffaCakes118
-
Size
340KB
-
MD5
eaf4a376b4dd542fa7c63429ade03a1c
-
SHA1
4be621823517b281ba166032286d884a6dc5fcd0
-
SHA256
bbd807cfb9bc69e8583d01d8c198f9a521a677955b439aee291302ec8d7bbdc3
-
SHA512
b8eca1e1ee63cd6ed5f4df2d8e069286e14118b0d3c5fa895c4e28d8a875057cd9bfa221882c913150eff07e020e7fab9fb1f5ea9fbb3e6d3f97cc8b166b3084
-
SSDEEP
6144:Dz4C9pdMHW5TIER/k9GxWdWbfPK6sDgJJP/iDK0PymPiLH++ngrwIhUNqKvG:Dd7T3R/ic4iQg3iDnPymPiowLNqa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eaf4a376b4dd542fa7c63429ade03a1c_JaffaCakes118
Files
-
eaf4a376b4dd542fa7c63429ade03a1c_JaffaCakes118.exe windows:4 windows x86 arch:x86
d4d506123219332dca7f1fea81db90f9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsAlloc
WaitForMultipleObjectsEx
_lclose
GetCompressedFileSizeW
PurgeComm
GetProcessVersion
ExpandEnvironmentStringsA
ReadFileScatter
VirtualProtect
GetModuleHandleA
GetUserDefaultLangID
LockResource
LockFile
FreeResource
SetEndOfFile
CreateWaitableTimerW
GetPrivateProfileStructA
WriteProfileStringW
CompareStringA
AddAtomA
DisconnectNamedPipe
GetConsoleMode
GetConsoleCursorInfo
WriteConsoleInputW
GetVolumeInformationW
TlsSetValue
GetPrivateProfileSectionW
SetConsoleTitleW
DeleteFiber
GetThreadPriority
GetLogicalDriveStringsW
GetConsoleScreenBufferInfo
GetCurrentThread
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
GetShortPathNameA
GetPrivateProfileSectionA
GetFileAttributesExW
FormatMessageW
GetVersionExA
SetUnhandledExceptionFilter
EnumResourceNamesA
GetPrivateProfileSectionNamesA
FoldStringW
SetEnvironmentVariableW
VirtualQueryEx
TerminateThread
GetStartupInfoA
user32
EnumDisplaySettingsW
GetInputState
PtInRect
InflateRect
CreateWindowExA
GetCapture
SendNotifyMessageW
UnionRect
GetClipboardFormatNameA
GetAsyncKeyState
TileWindows
OemToCharBuffW
FlashWindowEx
EnumWindowStationsW
SetWindowTextA
SetWindowWord
GetSubMenu
SendInput
MessageBoxExA
RegisterClassA
BeginPaint
WinHelpW
IsWindowUnicode
CreateAcceleratorTableA
CreateWindowStationW
LoadAcceleratorsW
gdi32
ExtCreateRegion
GetBrushOrgEx
Escape
CopyMetaFileW
GetEnhMetaFileBits
SetWinMetaFileBits
DeleteDC
UnrealizeObject
CreateICW
CreatePenIndirect
EnumFontFamiliesA
PaintRgn
GetDIBits
ExtTextOutA
FillPath
advapi32
RegisterEventSourceW
CopySid
CryptAcquireContextW
RegEnumKeyExW
RegUnLoadKeyW
RegGetKeySecurity
NotifyChangeEventLog
MapGenericMask
FreeSid
InitializeSid
InitiateSystemShutdownW
ReportEventW
SetEntriesInAclA
GetSecurityDescriptorControl
SetSecurityDescriptorDacl
ole32
OleInitialize
CoFreeAllLibraries
oleaut32
SafeArrayPtrOfIndex
comctl32
_TrackMouseEvent
ImageList_DrawEx
ImageList_SetIconSize
CreatePropertySheetPageW
shlwapi
StrRetToStrW
SHEnumValueW
PathIsRelativeW
StrTrimA
PathStripToRootA
PathFindNextComponentW
StrCmpNIA
StrFormatByteSize64A
PathIsDirectoryW
SHCopyKeyW
StrCpyW
UrlGetPartW
PathIsFileSpecA
PathAddBackslashW
StrCmpW
StrChrA
SHSetValueW
PathFindExtensionW
setupapi
SetupDiGetDeviceInstanceIdW
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
Sections
.text Size: 288KB - Virtual size: 285KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE