Static task
static1
Behavioral task
behavioral1
Sample
e011dafb15e6ee0688c0f47b6c9983d5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e011dafb15e6ee0688c0f47b6c9983d5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e011dafb15e6ee0688c0f47b6c9983d5_JaffaCakes118
-
Size
5.4MB
-
MD5
e011dafb15e6ee0688c0f47b6c9983d5
-
SHA1
ee8caacc1d1bbc2e6b4c56b251f6f56d2dd3c6cb
-
SHA256
b2843d5949b0bb73aaf73354dc5926cd27e4c5f958c11b1420701c59df09354d
-
SHA512
f7084c03af1967f0b6938880a7e63b57af711375292c9f9377f11f58feb5fe21c84a2bb8348028ed5c089b9a4b25852eee038e1310e87a04c5cd11da7174df29
-
SSDEEP
24576:Na3iRQBydtd/i4XJIpwNJnPMZK+yiah31iJnnZOwCmPLVFNdt/pkyGRTsKrQiuuW:icv/cQJEZKZi5K6/Za+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e011dafb15e6ee0688c0f47b6c9983d5_JaffaCakes118
Files
-
e011dafb15e6ee0688c0f47b6c9983d5_JaffaCakes118.exe windows:5 windows x86 arch:x86
f302f3dc6190d646c0a5b1a5aa1b096c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAllocEx
HeapAlloc
HeapFree
HeapSize
CloseHandle
GetModuleHandleW
GetStartupInfoW
GetCommandLineW
GetTempPathW
WriteConsoleW
SetStdHandle
GetStringTypeW
LoadLibraryW
SetFilePointerEx
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
RaiseException
RtlUnwind
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetProcAddress
CreateSemaphoreW
GetLastError
CreateThread
ExitThread
LoadLibraryExW
CreateTimerQueue
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsDebuggerPresent
OutputDebugStringW
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleHandleA
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
ReleaseSemaphore
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
HeapReAlloc
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
CreateFileW
psapi
GetDeviceDriverFileNameW
GetDeviceDriverBaseNameW
EnumDeviceDrivers
GetMappedFileNameW
GetProcessImageFileNameW
Sections
.text Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ei7i Size: 4.9MB - Virtual size: 4.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 215KB - Virtual size: 214KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ