Static task
static1
Behavioral task
behavioral1
Sample
e0fb4ceba83f68f7c031e72686a8b63e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0fb4ceba83f68f7c031e72686a8b63e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e0fb4ceba83f68f7c031e72686a8b63e_JaffaCakes118
-
Size
547KB
-
MD5
e0fb4ceba83f68f7c031e72686a8b63e
-
SHA1
0c87daf93670c2f14b72661c2d6f4ce89790b8e6
-
SHA256
379fce67093945f466c4c42317b812d22f51449d2a0b2b1b043e27b48968af9f
-
SHA512
0d6919c687e31f1ca0a0ac3c003c2bae07564f09a0cd619aeb41ca759640c0cb01f2767c1633efe61ba9287f291e8625d54d90207a5c9e83c59595871ffb07cd
-
SSDEEP
12288:CUF70lRjzPVT0lSJQ2gMXnx8ABQIuIYfT6ogS1fN8wotF123:CUFIl9z9THuGSANYfjwwS123
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e0fb4ceba83f68f7c031e72686a8b63e_JaffaCakes118
Files
-
e0fb4ceba83f68f7c031e72686a8b63e_JaffaCakes118.exe windows:4 windows x86 arch:x86
7fee299da138c45e646dfb3a2772d29a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsDebuggerPresent
LoadLibraryA
LCMapStringW
GetCurrentThread
GetSystemDirectoryA
GetCurrentThreadId
ExitProcess
SetEnvironmentVariableA
OpenMutexA
GetLocaleInfoW
FillConsoleOutputAttribute
HeapDestroy
CloseHandle
WritePrivateProfileSectionA
HeapSize
SetFilePointer
SetStdHandle
GetVersionExA
GetLogicalDriveStringsW
IsValidLocale
CreateFileA
GetModuleFileNameW
UnhandledExceptionFilter
VirtualQuery
GetTimeZoneInformation
GetSystemDefaultLCID
GetOEMCP
WritePrivateProfileStructW
LCMapStringA
GetTickCount
WriteConsoleA
WaitForSingleObjectEx
TerminateProcess
GetDateFormatW
GetFileType
GetCommandLineA
GetEnvironmentStringsW
OpenFile
GetCommandLineW
GetSystemTimeAsFileTime
GetDateFormatA
IsValidCodePage
TlsSetValue
GetLocaleInfoA
SetHandleCount
SetConsoleCtrlHandler
QueryPerformanceCounter
GetCurrentProcessId
CreateMutexA
FlushFileBuffers
GetStringTypeA
InterlockedIncrement
RtlUnwind
DeleteCriticalSection
LeaveCriticalSection
HeapReAlloc
InitializeCriticalSection
InterlockedExchange
WriteConsoleOutputAttribute
GetProfileIntW
SetLastError
VirtualAlloc
FreeEnvironmentStringsW
GetTimeFormatA
ConnectNamedPipe
GetProcAddress
GetConsoleCP
WriteFile
FreeEnvironmentStringsA
GetStringTypeW
GetProcessHeap
GetLastError
WriteConsoleW
WritePrivateProfileStringW
HeapCreate
FreeLibrary
GetCPInfo
EnumCalendarInfoW
GetModuleHandleA
EnumResourceLanguagesW
MultiByteToWideChar
EnumSystemLocalesA
MapViewOfFile
HeapAlloc
GetACP
InitializeCriticalSectionAndSpinCount
Sleep
WaitForDebugEvent
TlsFree
VirtualFree
EnumDateFormatsExW
InterlockedDecrement
GetConsoleMode
TlsGetValue
CompareStringW
HeapFree
SetUnhandledExceptionFilter
ReadFile
GetStdHandle
GetEnvironmentStrings
GetModuleFileNameA
GetStartupInfoW
CompareStringA
SystemTimeToTzSpecificLocalTime
GetStartupInfoA
GetUserDefaultLCID
FileTimeToDosDateTime
CreateThread
EnterCriticalSection
GetConsoleOutputCP
TlsAlloc
GetCurrentProcess
WideCharToMultiByte
comctl32
InitCommonControlsEx
user32
CreateCaret
RegisterClassA
ReleaseDC
GetWindowContextHelpId
RegisterClassExA
DeleteMenu
EnableWindow
Sections
.text Size: 211KB - Virtual size: 210KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 316KB - Virtual size: 315KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ