Static task
static1
Behavioral task
behavioral1
Sample
e0c237824f816634a69e14c501b2b187_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
e0c237824f816634a69e14c501b2b187_JaffaCakes118
-
Size
194KB
-
MD5
e0c237824f816634a69e14c501b2b187
-
SHA1
78c80eda2ff85f379be8fbd74b3d6e97ac52670a
-
SHA256
428f9307148368e9d9d0ba3dd8f193ea059d2d0ed582df629472f5319c97b5bf
-
SHA512
79ac096054b7b963cad222694994920a6b5ba4608a85ae71faf1fb5b0fbeedbff32202988b3be81ea485043c439fca2c80e56a26c443f5fdfaaa6719e32204c2
-
SSDEEP
3072:1OqmkvpG96l5oLpekv0aYtA3auSttQ8Jrf+Nn1Llh4JRVEcr4Z7:1Pv82iLM/YIthr8lK/rE7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e0c237824f816634a69e14c501b2b187_JaffaCakes118
Files
-
e0c237824f816634a69e14c501b2b187_JaffaCakes118.exe windows:5 windows x86 arch:x86
3f9936b01e7ee09ee94f9e05df318ddf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
OutputDebugStringW
GetProcessHeap
WideCharToMultiByte
InitializeCriticalSectionAndSpinCount
SizeofResource
HeapDestroy
LeaveCriticalSection
MultiByteToWideChar
lstrlenW
RaiseException
GetLastError
HeapSize
EnterCriticalSection
LocalAlloc
LockResource
DecodePointer
DeleteCriticalSection
CloseHandle
DebugBreak
LocalFree
HeapFree
WriteFile
Sleep
ReadFile
CreateFileW
lstrcpyA
CreateProcessW
GetModuleHandleW
GetExitCodeProcess
SetLastError
GetProcAddress
DeleteFileW
SetFileAttributesW
GetVersionExW
FlushFileBuffers
WriteConsoleW
ReadConsoleW
SetEndOfFile
SetStdHandle
LoadLibraryExW
GetCurrentProcess
InterlockedDecrement
InterlockedIncrement
HeapAlloc
LoadResource
FindResourceW
FindResourceExW
lstrlenA
GetFileSize
HeapReAlloc
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileType
GetFileInformationByHandle
FileTimeToLocalFileTime
GetModuleFileNameW
GetStdHandle
GetModuleHandleExW
ExitProcess
GetCurrentThreadId
SetEnvironmentVariableA
GetOEMCP
GetACP
IsValidCodePage
LCMapStringW
CompareStringW
GetStartupInfoW
IsDebuggerPresent
EncodePointer
GetStringTypeW
GetSystemTimeAsFileTime
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualQuery
FindClose
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetCommandLineW
RtlUnwind
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
user32
CharNextW
MessageBoxW
LoadStringW
CharLowerW
LoadIconW
advapi32
RegQueryValueExW
RegCloseKey
ConvertSidToStringSidW
RegOpenKeyExW
GetTokenInformation
OpenProcessToken
shell32
SHGetFolderPathW
ole32
CoUninitialize
CoInitialize
CoCreateInstance
shlwapi
StrToIntW
StrDupW
StrCatW
PathQuoteSpacesW
StrCpyW
PathFileExistsW
wnsprintfW
ws2_32
WSAResetEvent
WSASetLastError
WSAEnumNetworkEvents
WSACreateEvent
freeaddrinfo
WSAGetOverlappedResult
WSACleanup
WSAEventSelect
WSAConnect
WSAGetLastError
WSASend
WSASocketW
WSARecv
getaddrinfo
WSAStartup
WSASetEvent
WSACloseEvent
closesocket
rpcrt4
UuidCreateSequential
urlmon
UrlMkGetSessionOption
Sections
.text Size: 141KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ