Static task
static1
Behavioral task
behavioral1
Sample
e13ec24738c4135bc771754781b4d597_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e13ec24738c4135bc771754781b4d597_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e13ec24738c4135bc771754781b4d597_JaffaCakes118
-
Size
96KB
-
MD5
e13ec24738c4135bc771754781b4d597
-
SHA1
df21e0fa82dab5db79eea8c0d0627ff7c81d50c2
-
SHA256
92dd57303c013cd487aca6cd4c98481feea639b01c66601026a0e1b35d8497c9
-
SHA512
929adee86cfc5cb970bbb8dd96fd62ef7e85c41a1b6803cd49c78f9e3f63f5f1d634a004ef140cd1c438f29928216a67b57f3b17a57b42cd74b2edbc09c96a68
-
SSDEEP
3072:KDEg3c/630ceYYwK6FSLxg14IJwWM/dJJ2:KDEg3c5ceYYwxcLMwWMl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e13ec24738c4135bc771754781b4d597_JaffaCakes118
Files
-
e13ec24738c4135bc771754781b4d597_JaffaCakes118.exe windows:4 windows x86 arch:x86
4ee4bbb14ff1e7a36b90c8ec4337dd8e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileAttributesA
DeleteFileA
FindFirstFileA
lstrcpynA
GlobalFree
GlobalAlloc
FindClose
RemoveDirectoryA
lstrlenA
GetPrivateProfileStringA
MoveFileExA
GetStringTypeA
LoadLibraryA
GetProcAddress
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
WriteFile
RtlUnwind
FindNextFileA
GetShortPathNameA
CreateFileA
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
SetFilePointer
SetEndOfFile
GetWindowsDirectoryA
GetSystemDirectoryA
CreateDirectoryA
GetCommandLineA
GetCurrentProcess
lstrcpyA
lstrcatA
OutputDebugStringA
GetVersionExA
Sleep
GetFileType
GetStdHandle
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
GetEnvironmentStringsW
GetCurrentDirectoryA
GetFullPathNameA
GetDriveTypeA
GetLastError
GetFileAttributesA
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetVersion
ExitProcess
TerminateProcess
HeapFree
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetStringTypeW
user32
SendMessageA
wsprintfA
LoadIconA
LoadStringA
MessageBoxA
ExitWindowsEx
FindWindowA
advapi32
FreeSid
RegSetValueExA
GetTokenInformation
AllocateAndInitializeSid
EqualSid
OpenSCManagerA
OpenServiceA
ControlService
DeleteService
CloseServiceHandle
RegEnumKeyExA
RegQueryValueExA
RegDeleteKeyA
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
setupapi
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiOpenDevRegKey
SetupDiCallClassInstaller
SetupDiDeleteDeviceInfo
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 867B - Virtual size: 867B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE