Static task
static1
Behavioral task
behavioral1
Sample
e03d2cb2b76991a03dfd2a369e594f30_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e03d2cb2b76991a03dfd2a369e594f30_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e03d2cb2b76991a03dfd2a369e594f30_JaffaCakes118
-
Size
204KB
-
MD5
e03d2cb2b76991a03dfd2a369e594f30
-
SHA1
549af82ccb687aa037fe5ece423fc6bd25927c5f
-
SHA256
d32cf3cd9c55ff9fa4f7d425935ad4b28f8bb56bf5b0a91ce9c9bb00a7991e59
-
SHA512
aca21946097a04010a112aeccd6b66d5173ead80062541f44e0252688a292a613878fe8428533c74ee3156861e04ca24ff9a51ad34cb0f007d3a0441183fdbaa
-
SSDEEP
3072:2+2E6fHRT3m1EZBolNnBfO83gU59Hi+c0m1e9Awio8T2so/k:2ZzfHRTW1EAlN1O8PHw0m1nwiXSU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e03d2cb2b76991a03dfd2a369e594f30_JaffaCakes118
Files
-
e03d2cb2b76991a03dfd2a369e594f30_JaffaCakes118.exe windows:4 windows x86 arch:x86
66e74529d622b831e3acfd5f5856e4a2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateFileA
EnterCriticalSection
GetComputerNameA
GetVersion
GetProfileStringA
GetModuleHandleA
GetVersionExA
DeviceIoControl
CreateMutexA
ReleaseMutex
GetCommandLineA
GetOEMCP
GetFileAttributesA
FileTimeToDosDateTime
GetFileType
CopyFileA
SetFileTime
DeleteFileA
SetEndOfFile
MoveFileA
MoveFileExA
GetDiskFreeSpaceA
WideCharToMultiByte
MultiByteToWideChar
GetVolumeInformationA
GetLastError
IsDBCSLeadByte
FindFirstFileA
FindNextFileA
FindClose
GetFullPathNameA
GetCurrentDirectoryA
PeekConsoleInputA
ReadConsoleInputA
GetStdHandle
GetModuleFileNameA
WriteFile
Beep
WaitForSingleObject
ReadFile
CloseHandle
WriteConsoleA
GetConsoleScreenBufferInfo
GetConsoleCursorInfo
SetConsoleCursorInfo
SetConsoleCursorPosition
LoadLibraryA
GetProcAddress
FreeLibrary
SetFileAttributesA
GetCurrentProcess
GetFileTime
SetErrorMode
FileTimeToLocalFileTime
OpenEventA
SetConsoleCtrlHandler
GetDriveTypeA
SetPriorityClass
Sleep
SetFilePointer
GetFileSize
InterlockedDecrement
InterlockedIncrement
SetEnvironmentVariableA
FileTimeToSystemTime
CompareStringA
CompareStringW
SetStdHandle
GetStringTypeW
IsBadCodePtr
IsBadReadPtr
GetStringTypeA
GetEnvironmentStringsW
GetEnvironmentStrings
SetUnhandledExceptionFilter
FreeEnvironmentStringsA
GetACP
FreeEnvironmentStringsW
UnhandledExceptionFilter
GetStartupInfoA
GetCPInfo
FlushFileBuffers
LCMapStringW
SetHandleCount
TlsGetValue
LCMapStringA
TlsAlloc
SetLastError
TerminateProcess
IsBadWritePtr
HeapSize
VirtualFree
VirtualAlloc
HeapDestroy
ExitProcess
HeapCreate
TlsSetValue
HeapReAlloc
HeapFree
HeapAlloc
RtlUnwind
GetCurrentThreadId
GetTimeZoneInformation
GetSystemTime
GetLocalTime
user32
CharNextA
wsprintfA
GetSystemMetrics
SendMessageA
GetKeyboardType
gdi32
DeleteDC
GetTextMetricsA
Escape
GetDeviceCaps
CreateDCA
advapi32
GetUserNameA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegisterEventSourceA
DeregisterEventSource
ReportEventA
LookupAccountNameA
GetSidLengthRequired
SetFileSecurityA
AddAccessAllowedAce
IsValidSid
InitializeAcl
Sections
.text Size: 124KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 880B - Virtual size: 880B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ