Static task
static1
Behavioral task
behavioral1
Sample
ebe126b87ce9f46d663e6697bf3a90fe_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ebe126b87ce9f46d663e6697bf3a90fe_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ebe126b87ce9f46d663e6697bf3a90fe_JaffaCakes118
-
Size
111KB
-
MD5
ebe126b87ce9f46d663e6697bf3a90fe
-
SHA1
8c11d30aa6fee556cee81c954b5e5f488ff0bc9a
-
SHA256
bdda252b75a533b501832b612bd6c5bc22001a838449a9ade1df13c66fabc766
-
SHA512
42a4782bc06ab26ec001db0951b9d6b6c609211672cc138b406cc3c1ccc2a0c8c149a84b8e5709dc990ffafd669e895467df08484f53a6ffd992a7b29e82e82f
-
SSDEEP
1536:yt6yq87QvzeC24sE5iNydMOqdVFm7jiugr2977NjhEyiooyG42:OqzeiBiNmMOCVQHiL293NlE/+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ebe126b87ce9f46d663e6697bf3a90fe_JaffaCakes118
Files
-
ebe126b87ce9f46d663e6697bf3a90fe_JaffaCakes118.exe windows:4 windows x86 arch:x86
9113e521212bf09dea75e6a7652949b5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowLongA
GetKeyNameTextA
EnumChildWindows
GetMenuItemCount
EnumWindows
GetDlgItem
FillRect
TrackPopupMenu
CreateIcon
GetMessagePos
BeginPaint
SetWindowPos
ClientToScreen
GetClipboardData
GetFocus
GetMenu
DrawIcon
GetSysColor
CharLowerA
MessageBoxA
GetSysColorBrush
GetScrollInfo
DrawMenuBar
GetActiveWindow
GetWindow
EnumThreadWindows
GetMenuItemInfoA
GetIconInfo
GetMenuItemID
CreateMenu
GetMenuStringA
SetCursor
GetClassInfoA
IsWindowVisible
CreateWindowExA
GetParent
DrawFrameControl
SystemParametersInfoA
EnableMenuItem
ShowScrollBar
CheckMenuItem
EnableWindow
DeferWindowPos
GetForegroundWindow
DispatchMessageA
GetCursor
DispatchMessageW
IsDialogMessageA
GetKeyState
CharLowerBuffA
IsChild
HideCaret
CreatePopupMenu
IsMenu
GetClassLongA
SetWindowTextA
EqualRect
EndPaint
GetDCEx
GetLastActivePopup
EndDeferWindowPos
ShowWindow
FindWindowA
CharToOemA
DefFrameProcA
GetScrollPos
BeginDeferWindowPos
kernel32
FreeResource
SetEndOfFile
CloseHandle
ReadFile
LoadLibraryA
WideCharToMultiByte
GlobalDeleteAtom
Sleep
EnterCriticalSection
GetTickCount
CreateFileA
GetStringTypeW
GetEnvironmentStrings
WaitForSingleObject
GetACP
GlobalAlloc
GetDiskFreeSpaceA
GetFullPathNameA
GetProcAddress
GetStartupInfoA
GetStringTypeA
GetThreadLocale
InitializeCriticalSection
FindResourceA
VirtualAlloc
GetFileType
lstrlenA
GetFileSize
GetUserDefaultLCID
HeapAlloc
VirtualQuery
GetLastError
FormatMessageA
FindFirstFileA
GetLocalTime
ExitProcess
LockResource
lstrcatA
GetProcessHeap
GetFileAttributesA
DeleteFileA
GetCurrentProcess
CreateEventA
lstrcmpA
GetVersionExA
HeapFree
lstrcpyA
GetStdHandle
GetCurrentThreadId
GetCurrentThread
GetModuleHandleA
GetDateFormatA
MoveFileA
ExitThread
LoadLibraryExA
SetEvent
CompareStringA
MulDiv
VirtualAllocEx
SetFilePointer
DeleteCriticalSection
comctl32
ImageList_DrawEx
ImageList_Add
ImageList_Draw
ImageList_DragShowNolock
ImageList_Write
ImageList_Create
ImageList_Remove
ImageList_GetBkColor
ImageList_Read
ImageList_Destroy
msvcrt
rand
log10
strcmp
mbstowcs
memmove
wcstol
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ