Static task
static1
Behavioral task
behavioral1
Sample
eca13980df0ce997cc8eee34f336f3b1_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eca13980df0ce997cc8eee34f336f3b1_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
eca13980df0ce997cc8eee34f336f3b1_JaffaCakes118
-
Size
105KB
-
MD5
eca13980df0ce997cc8eee34f336f3b1
-
SHA1
4d21f8bca7ac22f6f0ebdbf3d075f4883760ec48
-
SHA256
7bf46a67c2bddc07140a2a5dcfb12751d8af6cb9288acb55bbdc9b14c3834dee
-
SHA512
8f213c008335dbdfa531cef0566ada90ecd683ffa3b112c7e155009e5b33f832d13001fa9c77e543c4b1facef647239fdc7400685dae714dccc03dc6ab2e9cf3
-
SSDEEP
1536:5NrTZSSJw8oD5mmiKoBHgiLUffXWpkSv8652xDc7Q+BYrjd6M:fTZhzoGlvLUnmn860c7LgZ6M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eca13980df0ce997cc8eee34f336f3b1_JaffaCakes118
Files
-
eca13980df0ce997cc8eee34f336f3b1_JaffaCakes118.exe windows:4 windows x86 arch:x86
2fcd15091d67bfd9c29a248c69305b05
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateToolhelp32Snapshot
EnterCriticalSection
FindClose
FreeLibrary
GetACP
GetCPInfo
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetModuleFileNameA
GetPrivateProfileSectionNamesA
GetProcAddress
GetStartupInfoA
GetSystemInfo
GetTempFileNameA
GetTempPathA
GetTimeFormatA
GetVersion
GetWindowsDirectoryA
GlobalAlloc
HeapCreate
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsValidCodePage
LoadLibraryA
LoadResource
Module32First
ReleaseMutex
RtlUnwind
SetCurrentDirectoryA
SetFileAttributesA
SetFilePointer
SuspendThread
TlsSetValue
VirtualAlloc
user32
CallWindowProcA
CharNextA
CharPrevA
CharUpperA
CreateDialogParamA
CreateWindowExA
DefWindowProcA
DestroyMenu
DestroyWindow
DrawIcon
EnableWindow
EndPaint
EnumChildWindows
GetClientRect
GetDC
GetMessageA
GetParent
GetWindowLongA
GetWindowTextLengthA
IsRectEmpty
LoadBitmapA
LoadCursorA
LoadImageA
MoveWindow
PeekMessageA
RegisterClipboardFormatA
SetDlgItemTextA
SetWindowRgn
SetWindowTextA
TrackPopupMenu
UnregisterClassA
UpdateWindow
wsprintfA
advapi32
AdjustTokenPrivileges
ChangeServiceConfig2A
ChangeServiceConfigA
CloseServiceHandle
ControlService
GetSecurityDescriptorControl
GetUserNameA
InitializeSecurityDescriptor
LockServiceDatabase
LookupAccountSidA
OpenProcessToken
OpenSCManagerA
QueryServiceStatus
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegFlushKey
RegOpenKeyA
RegOpenKeyExA
RegQueryValueA
RegQueryValueExA
RegSetValueExA
SetSecurityDescriptorDacl
SetServiceStatus
UnlockServiceDatabase
Sections
.text Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ