Static task
static1
Behavioral task
behavioral1
Sample
ec668349fad4e902b6bf9f1ee5df12d9_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec668349fad4e902b6bf9f1ee5df12d9_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ec668349fad4e902b6bf9f1ee5df12d9_JaffaCakes118
-
Size
39KB
-
MD5
ec668349fad4e902b6bf9f1ee5df12d9
-
SHA1
e21b763447bba30f9732fa0909a2226bfd8ba029
-
SHA256
c5d95420db10b1996ddd611d91911ce55b51ad51db8ad7eb59560c1f282e1fd0
-
SHA512
645e3c2826bb26aa2ef1e9c1b8b2ca71e8e53e721d93de0f2833762b868da90295c4eab66d543c1d214d4dc3a470d320860a3cb92398c912bede0f5057de0fc2
-
SSDEEP
768:BjqUAQBpZd6N93oNlZwuxiTN/VBosm63bmlWYp8N8R0wWX5jj+I:BZAApZgoNndx8dVjm6aLV0wWJ5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ec668349fad4e902b6bf9f1ee5df12d9_JaffaCakes118
Files
-
ec668349fad4e902b6bf9f1ee5df12d9_JaffaCakes118.exe windows:4 windows x86 arch:x86
1502f51532cd6fa9e40f607d32ae32f3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateFileA
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FreeLibrary
GetFileSize
GetFileType
GetProcAddress
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
OpenMutexA
OpenProcess
ReadFile
ResumeThread
SetEndOfFile
SetFilePointer
Sleep
TerminateThread
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
WinExec
WriteFile
user32
EndPaint
ExitWindowsEx
FindWindowExA
GetCapture
GetCursorPos
GetDC
GetSystemMetrics
GetWindow
GetWindowDC
GetWindowDC
GetWindowTextA
GetWindowTextLengthA
InvalidateRect
IsWindow
KillTimer
LoadCursorA
LoadIconA
LoadStringA
MessageBoxA
gdi32
CombineRgn
CreateBrushIndirect
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
CreateRectRgn
CreateSolidBrush
DeleteDC
DeleteObject
SetStretchBltMode
SetTextColor
SetWindowOrgEx
StretchBlt
TextOutA
shell32
DllRegisterServer
DllUnregisterServer
Shell_NotifyIcon
ShellExecuteA
SHGetPathFromIDList
comdlg32
ChooseFontA
Sections
CRT Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CODE Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CODE Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.text Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE