Static task
static1
Behavioral task
behavioral1
Sample
e1f43b21b8aff274acfe08a151fe7ca1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1f43b21b8aff274acfe08a151fe7ca1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e1f43b21b8aff274acfe08a151fe7ca1_JaffaCakes118
-
Size
146KB
-
MD5
e1f43b21b8aff274acfe08a151fe7ca1
-
SHA1
df677486df140ffcf45e7c82f946619c6c95a4c3
-
SHA256
422c2b50a4598c778abd70f6ae5c397437374dc05783ac8de739049547398de7
-
SHA512
321867a7d5bca249b3d8d9747f5a99b6f92388c7e7f02d8e34cef10a1dd8701e05f7a8232fc17251422d8345643523c61e0461d7c91bfe5cd1b0728aa834c7fa
-
SSDEEP
3072:9/R02Vho8HlL1pzXaKcJtq5Hc26kycgxQ0G4w8mwt69tX6Dj/:9qazqJtq5826kngfq6Dj/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e1f43b21b8aff274acfe08a151fe7ca1_JaffaCakes118
Files
-
e1f43b21b8aff274acfe08a151fe7ca1_JaffaCakes118.exe windows:4 windows x86 arch:x86
a3ff9c5eac580059dcff5d78c82d980e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThread
TlsSetValue
LocalAlloc
DeleteFileA
GetBinaryTypeA
GetVersion
lstrcatA
GlobalMemoryStatus
SetErrorMode
CreateThread
TlsAlloc
Beep
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetProcAddress
LoadLibraryA
IsBadReadPtr
lstrlenA
GetExitCodeThread
GetFileAttributesA
GetUserDefaultLangID
VerLanguageNameA
GlobalAlloc
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
HeapReAlloc
VirtualAlloc
WriteFile
LCMapStringW
RtlUnwind
VirtualFree
HeapCreate
ExitThread
TlsGetValue
SetFileAttributesA
LocalFree
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapAlloc
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
user32
wsprintfA
LoadImageA
FindWindowA
GetUpdateRect
LoadCursorFromFileA
CopyImage
GetDesktopWindow
EnumChildWindows
SetWindowTextA
UpdateWindow
GetWindowTextLengthA
GetWindowTextA
PostMessageA
GetQueueStatus
gdi32
GetObjectType
DeleteDC
DeleteObject
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 121KB - Virtual size: 196KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE