Static task
static1
Behavioral task
behavioral1
Sample
eb1f92b3491997a9f71bae40d96a92c3_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eb1f92b3491997a9f71bae40d96a92c3_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
eb1f92b3491997a9f71bae40d96a92c3_JaffaCakes118
-
Size
141KB
-
MD5
eb1f92b3491997a9f71bae40d96a92c3
-
SHA1
c510b35208e8d8011cb10e95e66474f27e820f7f
-
SHA256
b96a1f11c89474aa48911b89706b6f3de8123de9b5a2da467ffd7a00048e4c9b
-
SHA512
c92621263a5a19a997f0af2ca85c2560ca75a580652784db443df072c8f1dd2b276456ab7638c7aade0ff1064287e86e3e46aa5c001f58e70595bebab8dbca67
-
SSDEEP
3072:ogz1sv5860Veni4VA9WIbfpQOy0VNjtjf7IThGYpT3WwNCJt5wiHSAH+paD:o2sx10VenHq97Se9zINnNCJt7SAep
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb1f92b3491997a9f71bae40d96a92c3_JaffaCakes118
Files
-
eb1f92b3491997a9f71bae40d96a92c3_JaffaCakes118.exe windows:5 windows x86 arch:x86
169886f8b716733a574a09bbc4a11327
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetTopWindow
GetDC
IsDialogMessageA
EndPaint
ScrollWindow
GetSysColor
DestroyCaret
ScrollDC
NotifyWinEvent
EqualRect
RedrawWindow
MapWindowPoints
SetWindowLongA
ReuseDDElParam
DestroyMenu
GetSystemMetrics
SetActiveWindow
SetTimer
SetFocus
GetKeyNameTextW
SendDlgItemMessageA
EmptyClipboard
CharLowerBuffW
AdjustWindowRectEx
GetForegroundWindow
GetMenuState
LockWindowUpdate
GetActiveWindow
GetClassNameA
GetUpdateRect
SetScrollRange
DefWindowProcA
GetClassInfoW
CreateCaret
kernel32
WaitForMultipleObjects
GlobalReAlloc
GetCurrentThread
ExitProcess
MoveFileA
LocalAlloc
IsValidCodePage
OpenFileMappingA
GetSystemInfo
lstrlenW
GetDiskFreeSpaceA
DeleteFileA
HeapAlloc
LocalAlloc
FreeResource
GetSystemTime
CloseHandle
OutputDebugStringA
GetThreadPriority
GetFileType
ResetEvent
TerminateProcess
Sleep
GetComputerNameExA
MapViewOfFile
GetExitCodeThread
IsValidLocale
GlobalFindAtomA
ReadFile
VirtualQuery
WaitForSingleObject
SetEvent
lstrcpyA
CreateFileMappingA
UnmapViewOfFile
GetProcAddress
GetModuleHandleA
HeapFree
oleaut32
VariantChangeType
SysAllocStringLen
SafeArrayPtrOfIndex
VariantCopy
SafeArrayCreate
SafeArrayGetElement
idqxsso
_Dnorm
_LInf
_LSinh
_FSnan
_Wcrtomb
_Mbrtowc
_LRteps
_LEps
_FExp
_FDnorm
advapi32
GetUserNameA
RegFlushKey
imm32
ImmSetCompositionWindow
gdi32
PlayEnhMetaFile
CreateBrushIndirect
CloseEnhMetaFile
GetFontLanguageInfo
GetStockObject
GetBitmapBits
CreateDIBitmap
StartPage
GetDCOrgEx
RestoreDC
CreateBitmap
CreateRectRgnIndirect
EndPage
comctl32
ImageList_DragLeave
ImageList_Read
ImageList_Add
urlmon
CoInternetCreateZoneManager
ole32
CoTaskMemAlloc
CoCreateInstance
IsEqualGUID
OleSetMenuDescriptor
shell32
SHGetMalloc
Sections
.text Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ