Static task
static1
Behavioral task
behavioral1
Sample
ea5bb0f73b33b80393d91bf452cb9c33_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea5bb0f73b33b80393d91bf452cb9c33_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea5bb0f73b33b80393d91bf452cb9c33_JaffaCakes118
-
Size
209KB
-
MD5
ea5bb0f73b33b80393d91bf452cb9c33
-
SHA1
40937cb7ae6dd878aa1aefb71ac6b58aaf7777c3
-
SHA256
16e4c031dde085a828c5590ffb2e013b2ce456d91d7bb88e7f703e8b2899b76c
-
SHA512
467dd0260ce375950810c2945a355c2b2b53ccec50a028567e6b9474d16dbbd3ebe2aab3e0a2a708c75163e8b7a69d2e87f81cf1c5c92420d4f3d8693725c0e8
-
SSDEEP
3072:iulI9GQ/WHCV+LP9QCtTullbcC9nnU1wix/F0yalGwlREQTmkIuO:C9GCcL1ba1niwYFLmREPkD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea5bb0f73b33b80393d91bf452cb9c33_JaffaCakes118
Files
-
ea5bb0f73b33b80393d91bf452cb9c33_JaffaCakes118.exe windows:4 windows x86 arch:x86
34cacceb33ec49bc10e7b341c8eb04ad
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateProcessW
DeleteFileW
Sleep
GetTickCount
CopyFileW
GetSystemDirectoryW
CreateEventA
GlobalMemoryStatus
LeaveCriticalSection
FileTimeToLocalFileTime
FreeLibrary
LoadLibraryW
ExitProcess
GetCurrentProcessId
GetFileTime
GetModuleFileNameW
WideCharToMultiByte
GetProcessHeap
GetSystemTimeAsFileTime
GetCPInfo
FindClose
RemoveDirectoryW
MoveFileW
FindNextFileW
FindFirstFileW
TlsSetValue
TlsAlloc
GetCommandLineA
GetModuleHandleA
GetCurrentThreadId
MoveFileA
VirtualProtect
GetLocaleInfoA
FlushFileBuffers
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
QueryPerformanceCounter
HeapSize
SetStdHandle
SetFilePointer
ReadFile
SetEndOfFile
VirtualQuery
InterlockedExchange
RtlUnwind
HeapReAlloc
VirtualAlloc
GetOEMCP
GetSystemInfo
GetACP
LoadLibraryA
HeapAlloc
CreateFileA
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetStartupInfoA
GetVersionExA
GetProcAddress
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
user32
DrawTextA
GetMessageTime
GetDlgCtrlID
KillTimer
GetSystemMenu
UnhookWindowsHookEx
GetMenuItemInfoW
ScrollWindow
IsDialogMessageW
GetIconInfo
CheckDlgButton
CallNextHookEx
SendMessageTimeoutA
SetWindowTextA
MapWindowPoints
PostMessageW
DestroyWindow
SendMessageA
ValidateRect
DestroyMenu
BeginPaint
OpenClipboard
InvalidateRect
IntersectRect
InsertMenuItemW
SetCursor
SetParent
InflateRect
RemoveMenu
Sections
.text Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 273KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ