Static task
static1
Behavioral task
behavioral1
Sample
e0da57d44573baca96466884360ed039_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e0da57d44573baca96466884360ed039_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e0da57d44573baca96466884360ed039_JaffaCakes118
-
Size
141KB
-
MD5
e0da57d44573baca96466884360ed039
-
SHA1
6ae66c49ecd4ba98291c165ad5ee7e79f6ad3f08
-
SHA256
e4116c559b7bc90700ca57da7c68c07adb0285362238f3cdd323f6366ba34b77
-
SHA512
d6df70bf1d7f4234d56513f6d4733cc0ec72edf5ad7c860aac9ea8119c8328aa2bdb03dc7fd1290b104395a8ef31334402e39aeb3d77067f4b878c0750f948ee
-
SSDEEP
3072:UwlGX5IX50OBEWTMo+lB2Q97yQBgGfiz6ZflBuwyP:UwlJ50OBTQBVd4KflBu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e0da57d44573baca96466884360ed039_JaffaCakes118
Files
-
e0da57d44573baca96466884360ed039_JaffaCakes118.exe windows:5 windows x86 arch:x86
dc23872ce098ceb534b291cab25d339b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
MultiByteToWideChar
SetLastError
CreateFileMappingW
DeleteFileW
GetFileInformationByHandle
lstrcmpiW
LocalSize
GlobalLock
GlobalUnlock
GetCPInfo
IsDBCSLeadByte
LocalReAlloc
FormatMessageW
WideCharToMultiByte
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
RtlUnwind
ExpandEnvironmentStringsA
GetUserDefaultLangID
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
GetLocalTime
GetTimeFormatW
GetUserDefaultLCID
GetDateFormatW
lstrcpyW
LocalFree
lstrcatW
FoldStringW
LocalAlloc
FindClose
GlobalFree
LocalLock
lstrlenW
lstrcmpW
CompareStringW
CreateFileW
MulDiv
lstrcpynW
GetLocaleInfoW
FindFirstFileW
LocalUnlock
GetCommandLineW
lstrcpyA
GetTempPathA
CloseHandle
GetModuleHandleA
FindAtomA
LoadLibraryA
GetProcAddress
GetLastError
lstrcatA
WriteFile
lstrlenA
lstrcmpA
ExitProcess
user32
LoadImageW
RegisterWindowMessageW
GetSystemMenu
SetWindowPlacement
CharLowerW
EnableWindow
CreateDialogParamW
LoadCursorW
GetWindowTextW
DrawTextExW
LoadAcceleratorsW
RegisterClassExW
GetWindowPlacement
CharUpperW
SetWindowLongW
PeekMessageW
GetClientRect
LoadStringW
ShowWindow
CreateWindowExW
SetScrollPos
UpdateWindow
GetWindowLongW
DestroyWindow
SetCursor
CloseClipboard
TranslateAcceleratorW
ScreenToClient
SetActiveWindow
GetMessageW
PostQuitMessage
CharNextW
IsIconic
PostMessageW
GetSubMenu
DialogBoxParamW
IsClipboardFormatAvailable
MessageBeep
SetFocus
wsprintfW
GetDC
TranslateMessage
ChildWindowFromPoint
GetForegroundWindow
GetMenu
IsDialogMessageW
LoadIconW
GetKeyboardLayout
InvalidateRect
ReleaseDC
EnableMenuItem
GetMenuState
EndDialog
SendDlgItemMessageW
GetDesktopWindow
OpenClipboard
MessageBoxW
GetSystemMetrics
EqualRect
GetCursorPos
InflateRect
wsprintfA
GetFocus
GetWindowRect
ClientToScreen
DispatchMessageW
MoveWindow
CheckMenuItem
DefWindowProcW
WinHelpW
SetWindowTextW
GetDlgCtrlID
SendMessageW
SetDlgItemTextW
GetDlgItemTextW
IsWindowVisible
shell32
DragAcceptFiles
DragFinish
DragQueryFileW
ShellAboutW
shlwapi
SHGetValueA
gdi32
SetWindowExtEx
LPtoDP
EnumFontsW
StartPage
EndPage
EndDoc
DeleteDC
SetAbortProc
CreateDCW
SetBkMode
SetMapMode
StartDocW
SetViewportExtEx
TextOutW
GetTextExtentPoint32W
SelectObject
GetObjectW
GetTextFaceW
GetStockObject
CreateFontIndirectW
GetDeviceCaps
GetTextMetricsW
GetBkColor
DeleteObject
comdlg32
ChooseFontW
PrintDlgExW
CommDlgExtendedError
GetFileTitleW
FindTextW
GetSaveFileNameW
ReplaceTextW
GetOpenFileNameW
PageSetupDlgW
advapi32
RegOpenKeyExA
IsTextUnicode
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegCreateKeyW
RegQueryValueExA
winspool.drv
GetPrinterDriverW
OpenPrinterW
ClosePrinter
msvcrt
??3@YAXPAX@Z
??1type_info@@UAE@XZ
_ismbblead
__getmainargs
_cexit
_exit
_XcptFilter
exit
_acmdln
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_controlfp
__CxxFrameHandler
_time64
_localtime64
iswctype
wcsncpy
memset
memcpy
_wtol
wcsncmp
_CxxThrowException
_except_handler3
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 79KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ