Static task
static1
Behavioral task
behavioral1
Sample
eab2950521e2e17f90c87bcb847cd3bd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab2950521e2e17f90c87bcb847cd3bd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eab2950521e2e17f90c87bcb847cd3bd_JaffaCakes118
-
Size
192KB
-
MD5
eab2950521e2e17f90c87bcb847cd3bd
-
SHA1
a2568f39a3c05d4f720ac39cc71dd4cffec13f34
-
SHA256
7e502264237f15a7caf41517a953083b8394e7c1550d64af01a94bae5d25117a
-
SHA512
94d704cf15e080f7c8851ee2a7dc6d114af67bdd15556333e71b838bf2b34ebabd3138f4855450cceae2a72b6bdd7e9216628011d63c1497a8d2cf8352117028
-
SSDEEP
6144:LnXWx4wSizY9r4BlDqFVhbdfq351C2lF/cQ:LnXWKwSCkcBlOF3b1t2L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eab2950521e2e17f90c87bcb847cd3bd_JaffaCakes118
Files
-
eab2950521e2e17f90c87bcb847cd3bd_JaffaCakes118.exe windows:4 windows x86 arch:x86
840b5766dc0628fe583fd816c4a55de6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
_strnicmp
strncmp
strncpy
_strdup
free
sprintf
strlen
strcpy
strcat
strchr
_stricmp
memmove
strcmp
memcpy
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
HeapFree
HeapAlloc
InitializeCriticalSection
GetCommandLineA
GetCurrentProcess
DuplicateHandle
CloseHandle
CreatePipe
GetStdHandle
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
Sleep
FileTimeToLocalFileTime
FileTimeToSystemTime
GetDateFormatA
GetTimeFormatA
CompareFileTime
HeapReAlloc
FindFirstFileA
FindClose
SetErrorMode
GetLogicalDrives
FindNextFileA
GetDiskFreeSpaceA
GetLastError
GetWindowsDirectoryA
FindFirstChangeNotificationA
ResetEvent
SetEvent
TerminateThread
WaitForMultipleObjects
FindCloseChangeNotification
FindNextChangeNotification
CreateEventA
CreateThread
LoadLibraryA
GetProcAddress
FreeLibrary
MulDiv
WriteFile
CreateFileA
ReadFile
SetFilePointer
AllocConsole
GetConsoleScreenBufferInfo
SetConsoleCtrlHandler
user32
GetAsyncKeyState
SetWindowTextA
GetWindowTextLengthA
GetWindowTextA
GetSysColor
GetSysColorBrush
CreateWindowExA
SendMessageA
ValidateRect
CallWindowProcA
GetWindowRect
GetParent
MapWindowPoints
InvalidateRect
SetWindowLongA
IsWindowEnabled
GetWindowLongA
PostMessageA
SendDlgItemMessageA
GetDlgItemTextA
SetDlgItemTextA
EnableWindow
DestroyIcon
EndDialog
RedrawWindow
CreateDialogParamA
ShowWindow
LoadStringA
DestroyWindow
RemovePropA
DefWindowProcA
SetPropA
GetPropA
MoveWindow
GetClientRect
FillRect
GetWindow
SetActiveWindow
UnregisterClassA
DestroyAcceleratorTable
LoadIconA
LoadCursorA
PeekMessageA
MsgWaitForMultipleObjects
GetMessageA
GetActiveWindow
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
RegisterClassA
AdjustWindowRect
GetSystemMetrics
CreateAcceleratorTableA
SetCursorPos
LoadImageA
SetCursor
SystemParametersInfoA
GetKeyState
SetCapture
GetCursorPos
ReleaseCapture
IsWindowVisible
SetFocus
GetFocus
IsChild
GetClassNameA
EnumChildWindows
DefFrameProcA
gdi32
GetStockObject
SetBkColor
SetTextColor
CreatePen
SelectObject
MoveToEx
LineTo
DeleteObject
CreateSolidBrush
CreateDCA
GetDeviceCaps
CreateFontA
DeleteDC
comctl32
InitCommonControlsEx
shell32
ShellExecuteExA
SHGetFileInfoA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoInitialize
CoTaskMemFree
RevokeDragDrop
Sections
.code Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 611B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PACK Size: 144KB - Virtual size: 380KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE