Static task
static1
Behavioral task
behavioral1
Sample
e053d5561fe49ad29c56f5286a2fbbaf_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e053d5561fe49ad29c56f5286a2fbbaf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e053d5561fe49ad29c56f5286a2fbbaf_JaffaCakes118
-
Size
125KB
-
MD5
e053d5561fe49ad29c56f5286a2fbbaf
-
SHA1
447bbae73e3e7a97dc438c386c8676cc944f921e
-
SHA256
81b7f597a5ea7284f652eee47cb056978abb5ff0ca4bba89778518f3dd8d8a0e
-
SHA512
054a07a7982ab7147e3268f3e0e635311a2021527d2994eea9ce4c1ebdc7d7ceb07cb6cc6acd468ac108fff2359857724b43d1587542d75cf38ddc460943b4b4
-
SSDEEP
3072:ILlIukbttAOQuIbzh3VHq03sDO//ZwQ50TNHlZXm1O:SuF0SWVH3sS/XurZ2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e053d5561fe49ad29c56f5286a2fbbaf_JaffaCakes118
Files
-
e053d5561fe49ad29c56f5286a2fbbaf_JaffaCakes118.exe windows:4 windows x86 arch:x86
e17254c56b2a5c89345dc75170bde2f9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetFileTitleA
ChooseColorA
GetOpenFileNameA
gdi32
CopyEnhMetaFileA
CreateCompatibleBitmap
SaveDC
CreateBrushIndirect
GetPaletteEntries
LineTo
GetCurrentPositionEx
CreatePenIndirect
version
VerFindFileA
shell32
SHGetSpecialFolderLocation
user32
SetMenuItemInfoA
SetWindowLongW
SetCursor
SetFocus
SetScrollRange
SetWindowPlacement
SetClipboardData
SetScrollInfo
SystemParametersInfoA
UnregisterClassA
SetPropA
TrackPopupMenu
TranslateMDISysAccel
ShowWindow
SetWindowTextA
UnhookWindowsHookEx
SetScrollPos
SetCapture
ShowOwnedPopups
SetClassLongA
SetTimer
SetParent
SetMenu
SetWindowsHookExA
ShowScrollBar
TranslateMessage
SetForegroundWindow
SetRect
SetWindowPos
SetWindowLongA
kernel32
GetLastError
VirtualQuery
CompareStringA
CreateEventA
WriteFile
lstrcmpA
GetCommandLineA
GetCPInfo
FreeResource
SetEvent
GetStartupInfoA
GetVersionExA
GetModuleHandleA
VirtualAlloc
MoveFileExA
GetOEMCP
SizeofResource
GetFileType
GetProcAddress
LoadLibraryA
GlobalAddAtomA
GetACP
GetDateFormatA
IsBadReadPtr
MoveFileA
FreeLibrary
GetModuleHandleW
GetTickCount
GetStdHandle
GetCurrentThread
ExitThread
LockResource
GetFileSize
GetDiskFreeSpaceA
LocalAlloc
GetFullPathNameA
SetFilePointer
LoadResource
SetLastError
GetModuleFileNameA
GetThreadLocale
GetCurrentProcess
EnumCalendarInfoA
CloseHandle
GlobalAlloc
WaitForSingleObject
FindResourceA
ResetEvent
CreateFileA
HeapAlloc
GetProcessHeap
LoadLibraryExA
HeapFree
ReadFile
GetEnvironmentStrings
ExitProcess
GetVersion
VirtualAllocEx
lstrlenA
GlobalFindAtomA
IsBadHugeReadPtr
GetUserDefaultLCID
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ddata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 884B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ