Static task
static1
Behavioral task
behavioral1
Sample
e167e94e42360027e147412a8bab1d04_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e167e94e42360027e147412a8bab1d04_JaffaCakes118
-
Size
83KB
-
MD5
e167e94e42360027e147412a8bab1d04
-
SHA1
bec9b6923740965c2224288242bb49546eebdac5
-
SHA256
1cb2566f1c33175f7e96d4369639b37514a99aa0a8c9565f7a14e7e5866d75b6
-
SHA512
43b0967e89b6719b804594cd68399e68704fb7c5001d049e4c69c9e816403bbdffc7f4adc4b1aa0e68a3cff93b2b56b85d3a4f5386a5a4e20c53702e5bfa2af1
-
SSDEEP
1536:zvQM6Y4r0OhBRszLN5JXmNNw/69D+TO0zPNvnAznItaR8O+6FYTX:zvQW4r0OhBMlXmNNw/69iTbDJnAzn2aa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e167e94e42360027e147412a8bab1d04_JaffaCakes118
Files
-
e167e94e42360027e147412a8bab1d04_JaffaCakes118.exe windows:4 windows x86 arch:x86
ed99d3f4c029265592926e5cabdf4a84
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
CreateMutexA
LocalFree
Sleep
GetStdHandle
GlobalUnlock
GetModuleHandleA
PulseEvent
TerminateThread
lstrlenW
GetConsoleMode
CreateFileA
SetEnvironmentVariableA
CloseHandle
SetLastError
TlsGetValue
ReleaseMutex
HeapCreate
LoadLibraryExW
FindResourceA
user32
CopyRect
FillRect
CheckRadioButton
DrawEdge
DrawMenuBar
DispatchMessageA
GetClipCursor
CallWindowProcA
IsWindow
GetIconInfo
SetFocus
GetDC
GetDlgItem
apphelp
SdbCloseDatabase
SdbFindFirstTag
SdbFindNextTag
SdbGetDatabaseID
ApphelpCheckIME
clbcatq
ComPlusMigrate
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 74KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE