Static task
static1
Behavioral task
behavioral1
Sample
ec50ce6e66d279f4bb6170468e56948c_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ec50ce6e66d279f4bb6170468e56948c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ec50ce6e66d279f4bb6170468e56948c_JaffaCakes118
-
Size
392KB
-
MD5
ec50ce6e66d279f4bb6170468e56948c
-
SHA1
b744d3c186aab1d09a041b3a3b0e5efca0007e06
-
SHA256
1fd9102a96ed1d4c41882b6b634ac6302b2be3802afb7906fe477b4c4db0a853
-
SHA512
abe1771c7683c34deb058947a09ce6e24dec9234618c8fa68f0582510c254699e68463cd47d395bc7956b1a8986ee31139d01180704a47d8c4fbed6e8fdf4e6f
-
SSDEEP
6144:mvYfqT8DFt8Ie5IG29lI9s+DYJaTm1s3mDneqz2JIFwosFXtGQrhjz9ZwJDQUEI/:UOv8IznIDZes3UJ2JPoYXtyJDQUEI/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ec50ce6e66d279f4bb6170468e56948c_JaffaCakes118
Files
-
ec50ce6e66d279f4bb6170468e56948c_JaffaCakes118.exe windows:4 windows x86 arch:x86
896b8eeeb910778c68f28e58c68c8f41
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
GetPrivateProfileStringW
DebugBreak
GetBinaryTypeW
OpenFile
FindCloseChangeNotification
CreateFileW
FindResourceExA
VirtualQueryEx
LoadLibraryExW
GetModuleFileNameW
TlsGetValue
lstrcpynA
PeekConsoleInputW
GetDiskFreeSpaceExA
FlushFileBuffers
FormatMessageA
GetProcessHeap
QueryDosDeviceW
CreateEventA
CompareStringA
VirtualUnlock
WritePrivateProfileSectionW
ExitThread
lstrcpyA
FreeLibraryAndExitThread
LocalSize
GetCurrentProcess
WriteConsoleOutputCharacterA
AreFileApisANSI
GetCurrentProcessId
SetConsoleWindowInfo
CreateMutexA
WriteConsoleOutputW
SearchPathW
GetTempPathW
LeaveCriticalSection
OutputDebugStringA
IsBadWritePtr
ReadConsoleA
SetLastError
FileTimeToLocalFileTime
LoadResource
IsBadReadPtr
InitializeCriticalSection
FatalAppExitA
GetStartupInfoA
SetProcessShutdownParameters
_llseek
SetConsoleMode
TryEnterCriticalSection
CompareStringW
EraseTape
lstrcmpiW
MoveFileW
FormatMessageW
EnumTimeFormatsW
SetEnvironmentVariableA
EnumCalendarInfoW
GetComputerNameW
UnmapViewOfFile
SetThreadAffinityMask
GetCommModemStatus
GetThreadContext
FreeLibrary
_lread
GlobalGetAtomNameW
DeleteFiber
GetShortPathNameA
AllocConsole
GetLocaleInfoW
lstrcmpA
CancelIo
WritePrivateProfileStructA
GetDriveTypeA
_lclose
GetFileAttributesExA
GetLogicalDriveStringsA
GetVersionExA
VirtualProtect
SetConsoleActiveScreenBuffer
SetErrorMode
SizeofResource
SwitchToFiber
GetFileInformationByHandle
GetCommandLineA
lstrlenA
SetProcessAffinityMask
ExitProcess
user32
SetMenuItemInfoA
NotifyWinEvent
GetSysColor
DeleteMenu
EnumDesktopWindows
GetKeyNameTextW
SetLastErrorEx
SetDlgItemTextW
MapVirtualKeyA
DrawTextExA
SendInput
GetDCEx
GetDlgItemTextA
IsWindowUnicode
ScrollDC
MsgWaitForMultipleObjects
ChangeDisplaySettingsW
LoadIconA
GetMenuItemCount
GetWindowWord
OffsetRect
CreateDialogIndirectParamA
SetCaretPos
EndPaint
MessageBoxIndirectW
GetClipboardViewer
HideCaret
SetDlgItemInt
IsCharLowerA
wsprintfW
ClientToScreen
IsMenu
MoveWindow
CreateWindowExW
GetUserObjectInformationW
GetAsyncKeyState
EnumClipboardFormats
EnumDisplaySettingsExA
OpenIcon
GetMenuInfo
RegisterClassExW
SetWindowContextHelpId
GetWindowLongW
SendDlgItemMessageW
UnhookWindowsHookEx
GetKeyboardType
OpenWindowStationA
CopyRect
GetKeyboardLayout
GetLastActivePopup
BeginDeferWindowPos
SetMenuInfo
SetActiveWindow
LoadIconW
EnumDisplaySettingsExW
SetMenu
gdi32
ExtCreatePen
SetMapMode
GetNearestPaletteIndex
GdiComment
advapi32
RegQueryValueW
RegLoadKeyW
SetFileSecurityW
shell32
SHChangeNotify
DragAcceptFiles
SHGetSettings
ExtractIconA
FindExecutableA
ole32
OleRegGetUserType
shlwapi
PathFileExistsW
PathFindOnPathW
PathIsPrefixW
PathFindFileNameW
StrChrIW
SHRegSetUSValueW
Sections
.text Size: 332KB - Virtual size: 330KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE