Static task
static1
Behavioral task
behavioral1
Sample
e279b771ad78c6c76d0b477119def66e_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e279b771ad78c6c76d0b477119def66e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e279b771ad78c6c76d0b477119def66e_JaffaCakes118
-
Size
464KB
-
MD5
e279b771ad78c6c76d0b477119def66e
-
SHA1
1cad5dfdb7eda49dcf7b8ebbc76f5037ddd63e69
-
SHA256
bfa162c636644d640430a708a9d168d22cae0bb505f047bf90bd3604d765a59f
-
SHA512
6fb48f3a8958bc5710097e01e81546ba9df3496ba72b009946e699b8241205200a3ce7a64f0e105b566b169b82b48ab63b6f1928ce664d0861ad4b80480dea65
-
SSDEEP
12288:+9I6EmBG4kHW4IPIhJ672TGOZ6Udn8JQdjh:+9I6EmBG4kHWhIE2TGOZ6Udnzh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e279b771ad78c6c76d0b477119def66e_JaffaCakes118
Files
-
e279b771ad78c6c76d0b477119def66e_JaffaCakes118.exe windows:4 windows x86 arch:x86
36a41f9808f953f17a3201fb7eedfe2d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceA
LoadLibraryExA
LocalUnlock
GlobalFree
HeapCreate
GetModuleHandleA
Sleep
FreeConsole
UnmapViewOfFile
SetLastError
CreateFileA
HeapDestroy
CreateMutexA
ExitProcess
SetVolumeMountPointA
FreeEnvironmentStringsA
TlsGetValue
GetLastError
FindClose
GetACP
user32
GetFocus
GetIconInfo
DrawEdge
CopyRect
CallWindowProcA
IsWindow
DefWindowProcW
DrawMenuBar
DispatchMessageA
GetDlgItem
GetDC
FillRect
CheckRadioButton
uxtheme
GetThemeSysInt
GetThemeRect
DrawThemeEdge
DrawThemeIcon
DrawThemeText
clbcatq
SetupOpen
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ