Static task
static1
Behavioral task
behavioral1
Sample
e0f05ca7dabe80246a3f5e990c0eda3d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e0f05ca7dabe80246a3f5e990c0eda3d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e0f05ca7dabe80246a3f5e990c0eda3d_JaffaCakes118
-
Size
204KB
-
MD5
e0f05ca7dabe80246a3f5e990c0eda3d
-
SHA1
b00f617c1468dba269ddb5be7fbbf7d48ddca18a
-
SHA256
169c96bf51e7505597523cfbe35decc503edc67c3f6c5c3f8d1e46bc54d9a06e
-
SHA512
232ccc6c703554a25f6cc06f9472f8d24f0272cd069052815044675999f4d00853dc7205a9c2ff56dec5ee0208b644583db39cff4d3c2c7dc224cac77e4b5b69
-
SSDEEP
3072:SMdvevr3vGPrqCB4iJqzIfZi4VCtbhcF0UPZk+Q1Vf1Kng1w6:lvevrOPrqClFvWA8fMg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e0f05ca7dabe80246a3f5e990c0eda3d_JaffaCakes118
Files
-
e0f05ca7dabe80246a3f5e990c0eda3d_JaffaCakes118.exe windows:4 windows x86 arch:x86
a15e1eb43bf06463769b2f44ac47e3eb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetConsoleTitleA
GetDefaultCommConfigA
SetSystemTime
GetProfileStringA
GetCommandLineA
GetCommandLineA
GetComputerNameExA
ExitProcess
ReleaseSemaphore
GetSystemDirectoryA
ClearCommError
QueryDosDeviceA
LoadLibraryExA
GlobalMemoryStatus
DeviceIoControl
FindFirstChangeNotificationA
EnumUILanguagesA
GetConsoleCP
UpdateResourceA
DeviceIoControl
VirtualAlloc
InterlockedExchange
OpenWaitableTimerA
ReplaceFile
SetConsoleLocalEUDC
GetConsoleMode
GetWindowsDirectoryA
EnumResourceTypesA
GetLogicalDriveStringsA
GetConsoleOutputCP
ws2_32
send
Sections
.itext Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 160KB - Virtual size: 829KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ