Static task
static1
Behavioral task
behavioral1
Sample
ea464e4684cb8e9cd62b0434291efaf6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea464e4684cb8e9cd62b0434291efaf6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea464e4684cb8e9cd62b0434291efaf6_JaffaCakes118
-
Size
51KB
-
MD5
ea464e4684cb8e9cd62b0434291efaf6
-
SHA1
eff4f5a997cc46c6191fc3052fe55911b828cc2a
-
SHA256
36ca892b82c2fc6d9475b4cd761accccbf17f66cabe09d1ade78553e0b7efeb6
-
SHA512
318957e40d64ec8eefdeaa45463a660db62a414b116e8de671b53df0352eaf2b70c08a27eb57cddd120817b7ebfd95f35a2690d1a7b758425ef5340ebf953479
-
SSDEEP
1536:XauJQsU0fBr7fcvm4GWf60GkOjAsGr5DVc1:quuwfBruhpBGkOnGFDM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea464e4684cb8e9cd62b0434291efaf6_JaffaCakes118
Files
-
ea464e4684cb8e9cd62b0434291efaf6_JaffaCakes118.exe windows:4 windows x86 arch:x86
ae85ada6dfcfd38f93c7120bde826160
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
ChangeServiceConfigA
CloseServiceHandle
FreeSid
GetTokenInformation
OpenServiceA
QueryServiceConfig2A
RegEnumValueA
RegisterServiceCtrlHandlerA
StartServiceA
kernel32
CloseHandle
CompareStringA
CopyFileA
CreateEventA
CreateFileA
CreateProcessA
DeleteCriticalSection
DuplicateHandle
EnterCriticalSection
ExitProcess
FindClose
FormatMessageA
FreeLibrary
GetCPInfo
GetCommandLineA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetExitCodeProcess
GetFileAttributesA
GetFileTime
GetFileType
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetPrivateProfileSectionA
GetProcessHeap
GetShortPathNameA
GetStringTypeA
GetSystemDirectoryA
GetThreadLocale
GetThreadTimes
GetTickCount
GetTimeFormatA
GetVersion
GlobalAlloc
GlobalFree
GlobalHandle
GlobalLock
GlobalUnlock
HeapCreate
HeapDestroy
HeapFree
HeapSize
InitializeCriticalSection
InterlockedCompareExchange
InterlockedIncrement
IsBadReadPtr
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadResource
LocalFree
LockResource
MapViewOfFile
Module32Next
MoveFileA
MultiByteToWideChar
OpenProcess
OutputDebugStringA
QueryPerformanceCounter
ReadFile
ResetEvent
SetCurrentDirectoryA
SetErrorMode
SetEvent
SetFileTime
SetStdHandle
SystemTimeToFileTime
TlsAlloc
UnhandledExceptionFilter
VirtualAlloc
VirtualQuery
WriteConsoleA
WriteFile
lstrcatA
lstrcmpiA
user32
CheckMenuItem
CreateWindowExA
DefWindowProcA
DispatchMessageA
FindWindowA
GetActiveWindow
GetClassNameA
GetCursorPos
GetDlgCtrlID
GetDlgItem
GetDlgItemTextA
GetSysColor
GetSysColorBrush
GetSystemMenu
GetWindowTextA
GetWindowTextLengthA
IsRectEmpty
LoadBitmapA
LoadCursorA
LoadIconA
MessageBoxA
PeekMessageA
PtInRect
RegisterClassExA
SendDlgItemMessageA
SetDlgItemTextA
SetTimer
SetWindowRgn
TrackPopupMenu
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.INIT Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ