Static task
static1
Behavioral task
behavioral1
Sample
e1061249121d769122ba145ffd29df2e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1061249121d769122ba145ffd29df2e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e1061249121d769122ba145ffd29df2e_JaffaCakes118
-
Size
132KB
-
MD5
e1061249121d769122ba145ffd29df2e
-
SHA1
c884d8949722ca1a77d9665d5e90fc9760064b57
-
SHA256
036e57f8ac5cf8a4b97eff32205c89ea4c69c5f339fa8ef4b657e2ba715db34a
-
SHA512
87f605a0c62d9219b7da6b924639a91e9af6012ce91e1c0d83a4463baa83f32135d66e90b257bc7e2fe153c442cfc3d82a0aaaf33c77c5651f5c492e9fdaebe3
-
SSDEEP
3072:dgZqAgGwnPFeU4ze75LaSPzb2hp7IwbUZ9iCYGpkoanakh:GZqAgGsN4SpahakUZ9iClko+a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e1061249121d769122ba145ffd29df2e_JaffaCakes118
Files
-
e1061249121d769122ba145ffd29df2e_JaffaCakes118.exe windows:5 windows x86 arch:x86
1e94f689222d6326a7819b37176f3342
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
SetFileAttributesA
GetConsoleCursorMode
GetPrivateProfileStructA
GetCurrentDirectoryA
GetSystemTimes
GetCommModemStatus
SetVolumeMountPointA
GetPriorityClass
GetCommandLineA
GetWindowsDirectoryA
WriteConsoleInputA
Module32Next
SearchPathA
IsBadWritePtr
CreateSemaphoreA
GetFileAttributesExA
VirtualAllocEx
GetDiskFreeSpaceExA
SetTapeParameters
GetLongPathNameW
user32
EnumChildWindows
PrivateExtractIconExA
GetDlgItem
EndMenu
SetWindowTextA
DragObject
PrivateExtractIconsA
TabbedTextOutA
GetWindow
SendMessageTimeoutA
GetClipboardViewer
SetDlgItemInt
AlignRects
GetActiveWindow
GetMenuBarInfo
ChangeDisplaySettingsA
FlashWindow
gdi32
SetAbortProc
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ