Static task
static1
Behavioral task
behavioral1
Sample
e15e4a70b54df568c536405169417d5e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e15e4a70b54df568c536405169417d5e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e15e4a70b54df568c536405169417d5e_JaffaCakes118
-
Size
451KB
-
MD5
e15e4a70b54df568c536405169417d5e
-
SHA1
013153ebe9d656cae0813f33ed28a673610945d0
-
SHA256
b4920673fdbe4f730d196bd787fad186979b4e1345c970ae275581d7247b53f6
-
SHA512
6d0e6711141646b96fc31ad3c367384011dc2fa1e7ae9650b1c04bca24206529371a0d032f995bfe383ddedd432afd6e5dad04f7e68be1455b535603be8558e9
-
SSDEEP
12288:JxOxnwohgKGoiAnr2S2n0zacqFMuF5RHJE3xQUNSCmYL:knw4Xkn0mcqFvJS3xCY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e15e4a70b54df568c536405169417d5e_JaffaCakes118
Files
-
e15e4a70b54df568c536405169417d5e_JaffaCakes118.exe windows:4 windows x86 arch:x86
92b01f82b6af00ad3bce609b4bca174f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
NtAllocateVirtualMemory
RtlAdjustPrivilege
RtlAddAce
shell32
SHGetDesktopFolder
SHGetPathFromIDListA
SHBindToParent
SHGetPathFromIDListW
ShellExecuteW
SHGetFileInfoW
SHBrowseForFolderW
advapi32
ConvertSidToStringSidA
CredRenameW
ControlTraceA
CreateServiceW
BuildTrusteeWithNameA
CancelOverlappedAccess
user32
GetSubMenu
SetWindowTextW
RemoveMenu
CreatePopupMenu
SetCursor
LoadStringW
RegisterClipboardFormatW
DestroyMenu
LoadMenuW
DeleteMenu
MessageBoxW
LoadCursorW
InsertMenuW
InsertMenuItemW
SetMenuDefaultItem
SendMessageW
GetMenuItemInfoW
CharNextW
GetMenuItemCount
msvcrt
_adjust_fdiv
_except_handler3
memmove
free
_initterm
malloc
kernel32
GetVersionExW
lstrcpynW
GetTempFileNameW
SetThreadPriority
LocalAlloc
GetProcAddress
InterlockedDecrement
FreeLibrary
SetUnhandledExceptionFilter
_lwrite
GlobalAlloc
LocalFree
lstrcmpW
GetTempPathW
GetSystemDirectoryW
GetWindowsDirectoryW
lstrcpynA
CreateFileW
LoadLibraryW
lstrlenA
DosDateTimeToFileTime
TerminateProcess
GetCurrentThreadId
GlobalUnlock
GetSystemTimeAsFileTime
GetCurrentThread
GetModuleHandleW
GlobalFree
InterlockedIncrement
GlobalLock
UnhandledExceptionFilter
_lclose
lstrcmpiW
QueryPerformanceCounter
GetTickCount
_llseek
LocalFileTimeToFileTime
GlobalHandle
GetStartupInfoA
GetModuleFileNameW
GetShortPathNameW
_lread
lstrlenW
GetCurrentProcess
rpcrt4
RpcStringFreeW
ole32
CoCreateInstance
OleSetClipboard
CoTaskMemFree
CoUninitialize
ReleaseStgMedium
CoInitializeEx
shlwapi
StrCpyNW
PathCombineW
wnsprintfW
PathAddBackslashA
PathFindFileNameW
StrFormatKBSizeW
SHStrDupW
StrCmpNW
PathAppendW
PathFindFileNameA
StrRetToBufW
Sections
.text Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 229KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 928KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ