Static task
static1
Behavioral task
behavioral1
Sample
e123e22bb16957a8ac97cbc4750c78b9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e123e22bb16957a8ac97cbc4750c78b9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e123e22bb16957a8ac97cbc4750c78b9_JaffaCakes118
-
Size
330KB
-
MD5
e123e22bb16957a8ac97cbc4750c78b9
-
SHA1
9ac6707634e8104a35376a70348285fdc54b1b78
-
SHA256
556b515edb0b38dc2365e69988f9c787e747da5e21aad10a9ca2175bf0fb7bca
-
SHA512
b86b67ee2e5701b663b7d7e6929cbf7ac9482b4315d8234e81ba1e184d52dabbb8baa3f028b6f46db621ffe5c19d7e796abfc74daaf63097f7466e5d3221e2f6
-
SSDEEP
6144:mNxtJjd4FENLbqGIG8c4Q3HLVDYhMNjj10KLp20eld2v1eyQ9h:mxJjdGqnhIpcXrjf9l2/Q4d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e123e22bb16957a8ac97cbc4750c78b9_JaffaCakes118
Files
-
e123e22bb16957a8ac97cbc4750c78b9_JaffaCakes118.exe windows:4 windows x86 arch:x86
770660ac4b604646e1115e0ac76003ee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
shell32
SHGetDataFromIDListA
SheChangeDirA
DragQueryFileA
wininet
GopherGetLocatorTypeA
IncrementUrlCacheHeaderData
DetectAutoProxyUrl
InternetCombineUrlW
GopherGetLocatorTypeW
HttpAddRequestHeadersA
InternetSetCookieA
InternetShowSecurityInfoByURLA
ResumeSuspendedDownload
user32
GetOpenClipboardWindow
GetWindowLongA
CopyImage
GetWindowInfo
GetWindowTextLengthA
CharToOemW
PackDDElParam
MoveWindow
HideCaret
GetWindowDC
GetGuiResources
RegisterClassA
DrawIconEx
CreateDesktopW
DdeCreateStringHandleA
CharToOemBuffA
CharUpperBuffW
EnumDisplayMonitors
IsIconic
GetClassInfoA
EnableMenuItem
RegisterClassExA
RealChildWindowFromPoint
InvertRect
kernel32
CompareStringW
GetOEMCP
HeapDestroy
GetLocalTime
GetFileType
LeaveCriticalSection
InitializeCriticalSection
ExitProcess
SetLastError
GetStdHandle
IsBadWritePtr
LCMapStringW
GetModuleHandleA
GetEnvironmentStrings
CompareStringA
FlushFileBuffers
GetStringTypeW
GetCPInfo
HeapFree
GetTimeZoneInformation
DeleteCriticalSection
HeapReAlloc
TlsFree
HeapValidate
InterlockedIncrement
GetStartupInfoA
InterlockedDecrement
FreeEnvironmentStringsA
VirtualFree
SetConsoleCtrlHandler
HeapAlloc
GetStringTypeA
QueryPerformanceCounter
GetTickCount
TlsSetValue
CreateMutexA
GetCurrentThreadId
GetVersion
GetEnvironmentStringsW
UnhandledExceptionFilter
FreeEnvironmentStringsW
InterlockedExchange
TlsGetValue
SetEnvironmentVariableA
ReadFile
TerminateProcess
MultiByteToWideChar
GetCurrentProcessId
SetFilePointer
RtlUnwind
GetCommandLineA
GetModuleFileNameA
TlsAlloc
GetLastError
GetComputerNameW
WideCharToMultiByte
SetCurrentDirectoryA
EnterCriticalSection
GetCurrentProcess
VirtualAlloc
GetSystemTime
LoadLibraryA
GetProcAddress
HeapCreate
IsBadReadPtr
VirtualQuery
GetACP
LCMapStringA
GetCurrentThread
DebugBreak
SetStdHandle
CloseHandle
SetHandleCount
OpenMutexA
OutputDebugStringA
WriteFile
GetSystemTimeAsFileTime
comdlg32
ChooseColorW
FindTextA
GetFileTitleW
PrintDlgA
Sections
.text Size: 162KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 147KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ