Static task
static1
Behavioral task
behavioral1
Sample
ea9bd31feaebba7f829d8006cc8ea346_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea9bd31feaebba7f829d8006cc8ea346_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea9bd31feaebba7f829d8006cc8ea346_JaffaCakes118
-
Size
56KB
-
MD5
ea9bd31feaebba7f829d8006cc8ea346
-
SHA1
15f59fb67b36418c61f329ea67c6812c37592499
-
SHA256
bfdaf474a29efc39a089c300437ef3d505038b53b8b0c7b431bc8881d7710716
-
SHA512
3db7cb46f72b5d416884c9d8c2475a3e507b5864a8b3c12518385df40c0568307d3134250733ed7f6e6fa8a36631f37fadcb6a2a2bef7cb4b6149be45244cd10
-
SSDEEP
1536:l2eINd3NXvXtkoBu7NWzCHHIRPBgGrjzG:D2tkoENWWoRPBVXC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea9bd31feaebba7f829d8006cc8ea346_JaffaCakes118
Files
-
ea9bd31feaebba7f829d8006cc8ea346_JaffaCakes118.exe windows:4 windows x86 arch:x86
ab53a0daf263677fda96400cf0485b69
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
CreateFileA
CloseHandle
IsBadReadPtr
lstrlenW
HeapCreate
LocalUnlock
GetConsoleCP
GetACP
FreeEnvironmentStringsA
LoadLibraryExA
GetStdHandle
GetModuleHandleA
GetPrivateProfileIntA
GlobalLock
CreateEventA
LocalFree
CreateFileMappingA
IsDebuggerPresent
FindClose
user32
GetDC
CheckMenuItem
RedrawWindow
GetDlgItem
DialogBoxParamA
EndDialog
IsWindow
GetMessageA
GetListBoxInfo
DispatchMessageA
GetIconInfo
SetFocus
GetDlgItemTextA
DrawIconEx
uxtheme
CloseThemeData
GetThemeMetric
EnableTheming
GetThemeColor
DrawThemeIcon
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ