Static task
static1
Behavioral task
behavioral1
Sample
ceec5abd0b77d4233d446a5166e1f11f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ceec5abd0b77d4233d446a5166e1f11f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ceec5abd0b77d4233d446a5166e1f11f_JaffaCakes118
-
Size
120KB
-
MD5
ceec5abd0b77d4233d446a5166e1f11f
-
SHA1
a45fb4984e2d6f33ba584bef15430b47a57bfb7d
-
SHA256
c7e6b8b89089784e62f73d99bd65b3f236613b356c7b0b3b62afb28ab9fdf529
-
SHA512
c458144edf851f20ef9cddbe0ba2d1f628419414916cdf4099d9c2dc9206d67a29e9fd81a3a07e49345e2346935a21bd65e4906355739ba6dd1d4eb367c5ebc8
-
SSDEEP
3072:ejGjH/JEcNAcUb0fKjNuFO5FvsRP7rqmST2lnp/:ejAfTk0qG7m0p/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ceec5abd0b77d4233d446a5166e1f11f_JaffaCakes118
Files
-
ceec5abd0b77d4233d446a5166e1f11f_JaffaCakes118.exe windows:1 windows x86 arch:x86
c5c0524b4f22c388c70136dad2384a57
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetStdHandle
IsBadReadPtr
GetStartupInfoA
GetCurrentProcess
TlsAlloc
GetComputerNameW
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
QueryPerformanceFrequency
lstrcpynA
GetConsoleCP
FindClose
GetTimeFormatA
GetEnvironmentStrings
TlsGetValue
GetModuleFileNameA
ExitProcess
GetFileAttributesA
WideCharToMultiByte
GetLocaleInfoA
ResetEvent
MultiByteToWideChar
OpenEventA
GlobalUnlock
GetFileTime
MulDiv
HeapAlloc
HeapReAlloc
GetVersion
SetErrorMode
GetCurrentThreadId
FileTimeToSystemTime
RaiseException
GetStringTypeA
HeapCreate
IsBadStringPtrW
CreateFileMappingA
GetEnvironmentVariableA
LCMapStringW
SetThreadAffinityMask
VirtualQueryEx
FindResourceA
CreateEventA
TerminateProcess
SetEndOfFile
GetConsoleMode
CloseHandle
InterlockedDecrement
GetNumberFormatA
GetModuleHandleA
GlobalLock
GetProcessHeap
user32
GetDC
GetUpdateRgn
SetTimer
InsertMenuA
DefDlgProcA
LoadIconA
GetDlgCtrlID
GetWindowThreadProcessId
FillRect
DrawTextA
GetWindowLongA
IsDialogMessageA
ChildWindowFromPoint
EnumChildWindows
SetClipboardData
SetMenuItemInfoA
PeekMessageA
GetCursorPos
GetScrollInfo
PtInRect
InvalidateRect
EnumWindows
CloseClipboard
EndPaint
DrawIconEx
EndDialog
RegisterClassExA
CheckDlgButton
OpenClipboard
GetSysColorBrush
CreateMenu
DeleteMenu
GetDoubleClickTime
SetWindowTextA
SetDlgItemTextA
DefFrameProcA
RedrawWindow
SetWindowPlacement
LoadCursorA
SendMessageA
msvcrt
_exit
__getmainargs
_acmdln
__setusermatherr
_except_handler3
_XcptFilter
__set_app_type
_initterm
exit
__p__commode
_adjust_fdiv
_controlfp
__p__fmode
memcpy
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ