Static task
static1
Behavioral task
behavioral1
Sample
e9df152ce2f379367cc0f7ec2319aa1a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9df152ce2f379367cc0f7ec2319aa1a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e9df152ce2f379367cc0f7ec2319aa1a_JaffaCakes118
-
Size
851KB
-
MD5
e9df152ce2f379367cc0f7ec2319aa1a
-
SHA1
95961bb83ae5dd16d5b09b0bc6e6314039ae0d36
-
SHA256
bed6fbf2f0316a146341e533a7a1d85a45588efc58b565d24cc0d88dd26c2368
-
SHA512
50ccd2ad52a50b832e4e1ec44fcbf5ade9755067a2bdbe55e577df1ceb1ef4d6e707ecdfdae4864a9e88dceb4616e293ff7d6da6a58346717c4ee8239d7ed75c
-
SSDEEP
12288:yW787HOYzZSLlaUFe1OYpSX8eBfjRgeYlSC6WLmg9XAqquLCeCSqInGYx8pRIlx2:OLOYzZSLlawX8ayaCzr9XB2UGYcr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e9df152ce2f379367cc0f7ec2319aa1a_JaffaCakes118
Files
-
e9df152ce2f379367cc0f7ec2319aa1a_JaffaCakes118.exe windows:4 windows x86 arch:x86
673df7b0350ff14f47dddf1eb227eb7a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_DragEnter
DestroyPropertySheetPage
ImageList_GetBkColor
ImageList_Draw
user32
DefMDIChildProcA
ShowScrollBar
GetClipboardSequenceNumber
CheckDlgButton
CloseWindowStation
OpenIcon
EmptyClipboard
GetMenuStringA
DestroyCaret
GetMessageExtraInfo
GetWindowWord
GetClipboardFormatNameA
OpenDesktopA
ChangeClipboardChain
GetMenuItemRect
OpenClipboard
VkKeyScanA
IsCharLowerW
EnumWindowStationsA
kernel32
GetProcessHeap
GetCompressedFileSizeW
ExitProcess
GlobalFlags
GetOEMCP
WritePrivateProfileStringA
WriteFile
ExitThread
LeaveCriticalSection
SetConsoleOutputCP
GetBinaryTypeA
_llseek
IsProcessorFeaturePresent
GenerateConsoleCtrlEvent
QueryDosDeviceW
GetProcessTimes
FreeResource
EraseTape
GetModuleFileNameW
DeleteFiber
GlobalAddAtomW
LCMapStringA
SetConsoleCursorPosition
GlobalAddAtomA
GetACP
CreateProcessA
EnumSystemCodePagesW
WriteConsoleOutputCharacterA
GetVersion
UnhandledExceptionFilter
GetEnvironmentStringsW
GetTimeZoneInformation
GetAtomNameA
GetLocaleInfoW
SetEvent
LocalReAlloc
SetConsoleTitleA
ReadFile
GetBinaryTypeW
EnumCalendarInfoW
GetSystemTimeAsFileTime
lstrcpynA
DeleteCriticalSection
advapi32
ObjectCloseAuditAlarmA
RegFlushKey
RegCreateKeyW
CryptExportKey
QueryServiceLockStatusW
RegQueryValueExA
StartServiceCtrlDispatcherA
StartServiceA
ReportEventW
LookupPrivilegeDisplayNameA
CryptReleaseContext
SetNamedSecurityInfoW
RegUnLoadKeyA
CopySid
SetSecurityDescriptorSacl
UnlockServiceDatabase
msvcrt
_mbsdec
perror
_wtol
_snwprintf
fread
_setmode
_getdcwd
_lseeki64
_beginthread
wcscoll
_itoa
wscanf
_ui64tow
_mbsrchr
_strdup
_chmod
_mbctoupper
mktime
_stricoll
_wsetlocale
ftell
_wstrdate
_controlfp
_isctype
iswxdigit
Sections
.text Size: 11KB - Virtual size: 227KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 597KB - Virtual size: 596KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ