Static task
static1
Behavioral task
behavioral1
Sample
eddff242285dbf48484a04a0bf223269_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
eddff242285dbf48484a04a0bf223269_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
eddff242285dbf48484a04a0bf223269_JaffaCakes118
-
Size
3.7MB
-
MD5
eddff242285dbf48484a04a0bf223269
-
SHA1
3001424cbfb9d2831e3db1d516b98c06362fea44
-
SHA256
abbb3d6f2ade46b8e060589d3898956cd0a6f408298292c6b64ffe3a5855b628
-
SHA512
071d1c0176d557055a3a84e5ba93f684d14890d99e6501485bf651d0989f64cdfb90434f8681cecc53773afead668d8ba268a9cccac1bddf140daa74fa2d217b
-
SSDEEP
98304:U8jM/0DC8btF4Sk6NpZx4cPxHi1vSidnMQvwR:U8YcDC8btF4Skk4oZQdnMLR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eddff242285dbf48484a04a0bf223269_JaffaCakes118
Files
-
eddff242285dbf48484a04a0bf223269_JaffaCakes118.exe windows:4 windows x86 arch:x86
7d9a79ab584a121082c64628fc845c7b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeInformationA
SetFileAttributesA
lstrcmpA
GetUserDefaultLangID
GetVersionExA
GetFileTime
LocalAlloc
SetFileTime
SystemTimeToFileTime
_llseek
IsDBCSLeadByte
FileTimeToSystemTime
WriteFile
lstrcpynA
SearchPathA
GetSystemDirectoryA
GetEnvironmentVariableA
GetWindowsDirectoryA
GetFileAttributesA
CreateFileA
_lopen
GetModuleFileNameA
lstrlenA
lstrcatA
GetCurrentDirectoryA
CloseHandle
LocalFree
_lclose
DeleteFileA
GetStartupInfoA
_lread
lstrcpyA
CreateDirectoryA
GetModuleHandleA
user32
DialogBoxParamA
KillTimer
CharUpperA
GetDlgItemTextA
PostMessageA
SendDlgItemMessageA
SetWindowTextA
SetFocus
BeginPaint
GetSystemMetrics
GetWindowRect
MoveWindow
LoadIconA
SetTimer
IsIconic
DestroyIcon
GetDlgItem
DrawIcon
SetDlgItemTextA
PeekMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
wsprintfA
CharLowerA
CharNextA
CharPrevA
EndDialog
MessageBoxA
SendMessageA
EnableWindow
EndPaint
gdi32
SetMapMode
GetMapMode
comdlg32
GetOpenFileNameA
GetFileTitleA
advapi32
RegCreateKeyA
RegSetValueA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
crtdll
_global_unwind2
_exit
_local_unwind2
exit
strchr
strrchr
atoi
memset
_XcptFilter
_acmdln_dll
_initterm
__GetMainArgs
_commode_dll
_fmode_dll
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 149B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ