Static task
static1
Behavioral task
behavioral1
Sample
ea66184776449c30b1c79358cfa637d8_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea66184776449c30b1c79358cfa637d8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea66184776449c30b1c79358cfa637d8_JaffaCakes118
-
Size
56KB
-
MD5
ea66184776449c30b1c79358cfa637d8
-
SHA1
9c58c6aed3e61e47ea24a2f5dc1379eea006e961
-
SHA256
8b6a25c89f95548bb79447fa9f3ab12372b252a33445b827bded8cc9ad6990f9
-
SHA512
734b497ffaac2fa0d8d32f111b9fec64fca820f853469f25eb4d5fa02c3762fa2dcf652b5008215c8f08d9fd7337d8b6737fe9287177792d6b9ebaa0c777a794
-
SSDEEP
768:QEB6VmTprGdugpajuPgM4RbDN+FXuB4jZu31RF+ft7kHOBGCTHE8Qj1tuNM1Yo7c:PB7GwqmxDNaM4jZE1H+VkHIg7u1SSbR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea66184776449c30b1c79358cfa637d8_JaffaCakes118
Files
-
ea66184776449c30b1c79358cfa637d8_JaffaCakes118.exe windows:4 windows x86 arch:x86
54a9fe283bd923bdd921c4c8b0206eca
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ChangeServiceConfigA
CloseServiceHandle
DeleteService
LockServiceDatabase
OpenServiceA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
kernel32
CreateEventA
CreateFileA
CreateProcessA
CreateThread
DeleteAtom
DeleteFileA
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsA
FindClose
FreeLibrary
GetACP
GetConsoleOutputCP
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetEnvironmentVariableA
GetFileTime
GetFileType
GetLastError
GetModuleHandleA
GetPrivateProfileSectionA
GetPrivateProfileSectionNamesA
GetProcessHeap
GetStdHandle
GetSystemDirectoryA
GetSystemTime
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetThreadLocale
GetTickCount
GetVersion
GetVersionExA
GlobalAlloc
GlobalFree
GlobalHandle
GlobalReAlloc
HeapCreate
HeapFree
HeapSize
InitializeCriticalSection
InterlockedDecrement
IsBadCodePtr
IsBadWritePtr
LoadLibraryA
LocalFree
MapViewOfFile
OpenProcess
QueryPerformanceCounter
ReadFile
ReadProcessMemory
RemoveDirectoryA
RtlUnwind
SetCurrentDirectoryA
SetFilePointer
SetFileTime
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SizeofResource
Sleep
SuspendThread
TerminateProcess
TlsAlloc
TlsFree
UnmapViewOfFile
VirtualFree
VirtualQuery
WaitForSingleObject
WriteFile
WritePrivateProfileStringA
lstrcmpA
user32
CallNextHookEx
CharUpperA
ClientToScreen
CreateDialogParamA
CreateWindowExA
DestroyWindow
DialogBoxParamA
DrawFocusRect
DrawIcon
EndDialog
EndPaint
GetCapture
GetKeyState
GetWindowDC
GetWindowThreadProcessId
IsIconic
IsWindow
MessageBoxA
PostMessageA
RegisterClipboardFormatA
RegisterWindowMessageA
ReleaseCapture
ReleaseDC
SendMessageA
SetWindowLongA
SetWindowTextA
SystemParametersInfoA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 13KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ