Static task
static1
Behavioral task
behavioral1
Sample
e0dc9f519a48ab33ce16feaf94bf1274_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e0dc9f519a48ab33ce16feaf94bf1274_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e0dc9f519a48ab33ce16feaf94bf1274_JaffaCakes118
-
Size
337KB
-
MD5
e0dc9f519a48ab33ce16feaf94bf1274
-
SHA1
3bef400d04f18902f0e527fc4ab356d767d6910d
-
SHA256
2012978963aa3cd33ce58a3f1e5874f20e314a31ae065426199d5a3714e4fbc2
-
SHA512
366392634489f1e8b234cafb92eef7861997801841cb51727fb88687627ebd2da68c761ef4d23488d9f0c341d246b139cd1a794a719a78263b79224f7574795b
-
SSDEEP
6144:TEoZUDKx+hHy+4nlVkAUN6OhLRzGmUaWC+/IYUZ9mV6y:s4lH/OhLRGmUcZ9iT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e0dc9f519a48ab33ce16feaf94bf1274_JaffaCakes118
Files
-
e0dc9f519a48ab33ce16feaf94bf1274_JaffaCakes118.exe windows:5 windows x86 arch:x86
26c6fd1a964e05c466f33f45607044fa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_BIND
IMAGE_DLLCHARACTERISTICS_WDM_DRIVER
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_SYSTEM
Imports
kernel32
InterlockedCompareExchange
Sleep
InterlockedExchange
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
HeapAlloc
HeapCreate
GetLastError
GetProcAddress
LoadLibraryA
GetSystemTimeAsFileTime
GetCurrentProcessId
FreeLibrary
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
user32
GetMessageA
TranslateMessage
GetDC
BeginPaint
SendMessageA
GetClientRect
LoadIconA
EndPaint
RegisterClassExA
CloseClipboard
SetDlgItemTextA
LoadCursorA
FindWindowA
SetClipboardData
EnableWindow
EmptyClipboard
MessageBoxA
CreateWindowExA
CopyImage
GetDlgItem
GetSysColor
IsDlgButtonChecked
GetKeyboardType
DispatchMessageA
OpenClipboard
SetWindowTextA
gdi32
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
Polyline
DeleteObject
ChoosePixelFormat
SetPixelFormat
GetStockObject
CreateFontIndirectA
DeleteDC
CreatePen
DescribePixelFormat
advapi32
RegSetKeySecurity
shell32
SHBrowseForFolderA
SHGetMalloc
SHGetPathFromIDListA
SHGetDesktopFolder
ws2_32
WSASendDisconnect
msvcp90
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
version
GetFileVersionInfoW
iphlpapi
GetTcpTable
msvcr90
__getmainargs
__CxxFrameHandler3
_controlfp_s
_invoke_watson
_except_handler4_common
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
_crt_debugger_hook
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
_ismbblead
_XcptFilter
_exit
_cexit
memcpy
memmove_s
free
malloc
_invalid_parameter_noinfo
??3@YAXPAX@Z
exit
??2@YAPAXI@Z
_amsg_exit
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 206KB - Virtual size: 205KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kera Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kom Size: 1024B - Virtual size: 925B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.udata Size: 512B - Virtual size: 490B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ