Static task
static1
Behavioral task
behavioral1
Sample
ea7b3e372db1b0980cbd3d92142c1520_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea7b3e372db1b0980cbd3d92142c1520_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea7b3e372db1b0980cbd3d92142c1520_JaffaCakes118
-
Size
1.1MB
-
MD5
ea7b3e372db1b0980cbd3d92142c1520
-
SHA1
db452b53dc1cc57c9e4e902e270610a7a671e98a
-
SHA256
10cab1deea5096566036bc761f30801e478df0649cb5a98476d927372df51a69
-
SHA512
574a5e2e0595560b379c20716047b87b5853183f50b9581875a9d4ff808bb013dc7d54a1fd0f07f34ac6e479d5f1fee99c2e2bc002d1d17a07e6183e20c16fec
-
SSDEEP
6144:zMtipohjpRsrj7HQH0/huEtZ6ZlZrADLzZJLe2EfLNJx5TZBtBBhxTJh5Vzd551X:zVwEUk9gk4VTCp9qWF6nJnSSqmD9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea7b3e372db1b0980cbd3d92142c1520_JaffaCakes118
Files
-
ea7b3e372db1b0980cbd3d92142c1520_JaffaCakes118.exe windows:5 windows x86 arch:x86
2c5a9e5b85899be204bdfc27a71fe24a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
GetTimeFormatA
GetTimeFormatW
GetUserDefaultLCID
GetVersionExA
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LocalAlloc
LocalFree
GetSystemTimeAsFileTime
MultiByteToWideChar
QueryPerformanceCounter
SetEnvironmentVariableW
SetEvent
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
TerminateThread
UnhandledExceptionFilter
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
lstrcpynA
lstrlenA
GetSystemDefaultLangID
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetLastError
GetDateFormatW
GetDateFormatA
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
FreeLibrary
FormatMessageW
FormatMessageA
FileTimeToSystemTime
FileTimeToLocalFileTime
EnterCriticalSection
DuplicateHandle
DeleteCriticalSection
CreateThread
CreateEventW
CreateEventA
CloseHandle
AreFileApisANSI
VirtualAllocEx
GetDriveTypeA
GetModuleHandleW
LocalReAlloc
user32
GetDC
GetDlgItem
GetFocus
GetMessageA
GetParent
GetProcessWindowStation
GetSystemMetrics
GetThreadDesktop
GetUserObjectInformationW
GetWindowLongA
GetWindowRect
InvalidateRect
IsDialogMessageA
IsWindowEnabled
IsWindowVisible
KillTimer
LoadIconA
LoadStringA
LoadStringW
MapWindowPoints
MessageBoxA
MessageBoxW
MsgWaitForMultipleObjects
PeekMessageA
PostMessageA
PostQuitMessage
RedrawWindow
RegisterClassA
RegisterClassW
RegisterWindowMessageA
RegisterWindowMessageW
ReleaseDC
SendMessageA
SendMessageW
SetCursor
SetFocus
SetForegroundWindow
SetRect
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
SetWindowTextW
ShowWindow
SystemParametersInfoA
TranslateMessage
UpdateWindow
WinHelpA
WinHelpW
wsprintfW
GetClientRect
FindWindowW
FindWindowExW
FindWindowA
FillRect
EndPaint
EnableWindow
DrawTextW
DrawTextA
DrawIcon
DrawFocusRect
DrawAnimatedRects
DispatchMessageA
DestroyWindow
DefWindowProcW
DefWindowProcA
DefDlgProcW
DefDlgProcA
CreateWindowExW
CreateWindowExA
CreateDialogParamW
CreateDialogParamA
CallWindowProcW
BeginPaint
AttachThreadInput
GetSysColor
LoadCursorA
FindWindowExA
gdi32
SetTextColor
SetBkColor
SelectObject
SaveDC
RestoreDC
GetTextExtentPointW
GetTextExtentPointA
GetObjectA
DeleteObject
CreateFontIndirectW
CreateFontIndirectA
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExW
RegEnumKeyW
RegEnumKeyA
RegCreateKeyExW
RegCreateKeyExA
RegCloseKey
OpenThreadToken
OpenProcessToken
GetUserNameW
RegOpenKeyExA
RegQueryValueExW
GetUserNameA
RegSetValueExW
ole32
StringFromGUID2
CoUninitialize
CoTaskMemFree
CoRevokeClassObject
CoRegisterClassObject
CoInitializeEx
CoInitialize
CoFreeUnusedLibraries
CoCreateInstance
CLSIDFromString
msvcrt
__p__fmode
wcscmp
toupper
strncpy
exit
_onexit
_initterm
_ftol
_exit
_except_handler3
_controlfp
_XcptFilter
__argc
__argv
__dllonexit
__getmainargs
__p__commode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ