Static task
static1
Behavioral task
behavioral1
Sample
eb475417605251dd5912e0992914b9fd_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eb475417605251dd5912e0992914b9fd_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
eb475417605251dd5912e0992914b9fd_JaffaCakes118
-
Size
204KB
-
MD5
eb475417605251dd5912e0992914b9fd
-
SHA1
9654552c576d690d8f836163d31380553c6db0d9
-
SHA256
fda23c177f1696c4f57265251668db8f1e91e2a44c5e3cb69eff3cf104bbb7e4
-
SHA512
67abb745dda0bb866a5a7cbc471a9f86c6b7c6713e5eed5266355fcdc6a6d6202198131cdf5b5314fcca2576100908862885a55cfa1766ef20d704a1e9f1af44
-
SSDEEP
3072:41lm0B0AeIW8vdAeAC27kNEe/wLiPKLFI1RGwGBUGxZNotLnvS/cdF:B20Aeb8vWrCKboSxI1RGwGQvl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb475417605251dd5912e0992914b9fd_JaffaCakes118
Files
-
eb475417605251dd5912e0992914b9fd_JaffaCakes118.exe windows:4 windows x86 arch:x86
069ec14247e62dd0c047e11ecd28e3d8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
PulseEvent
lstrcpyA
lstrlenA
VirtualFree
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceExA
GetLastError
VirtualProtect
GetModuleHandleA
DeleteFileA
ReadFile
CreateFileA
HeapAlloc
GetSystemInfo
VirtualAlloc
LocalAlloc
InterlockedDecrement
GlobalFree
WriteFile
GlobalAlloc
LoadLibraryA
SystemTimeToFileTime
GetSystemTime
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
GetStartupInfoA
DebugBreak
HeapReAlloc
HeapFree
GetModuleFileNameA
VirtualQuery
LoadLibraryW
GetProcAddress
SetEvent
FreeLibrary
ExitProcess
GetCommandLineA
GetCurrentThreadId
lstrcmpiA
Sleep
CreateEventA
CreateThread
WaitForSingleObject
CloseHandle
HeapCreate
user32
GetDesktopWindow
TranslateAcceleratorA
LoadAcceleratorsA
LoadStringA
RegisterClassExA
LoadCursorA
LoadIconA
UpdateWindow
ShowWindow
CreateWindowExA
PostQuitMessage
EndPaint
DrawTextA
BeginPaint
IsWindow
DialogBoxParamA
EndDialog
UnregisterClassA
PeekMessageA
TranslateMessage
PostMessageA
GetDC
FillRect
ReleaseDC
GetClientRect
RegisterClassA
BringWindowToTop
DefWindowProcA
GetMessageA
IsWindowVisible
IsRectEmpty
DestroyWindow
SetRect
DispatchMessageA
CharNextA
PostThreadMessageA
AttachThreadInput
gdi32
Rectangle
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
GetDIBits
SetROP2
GetObjectA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
VariantClear
VariantInit
atl
ord57
ord21
ord16
ord23
ord17
ord20
ord18
pdh
PdhGetLogFileSize
PdhGetDataSourceTimeRangeW
wininet
InternetCloseHandle
InternetOpenW
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 166KB - Virtual size: 778KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE