Static task
static1
Behavioral task
behavioral1
Sample
ead3e693a1caf5b1f180540b79254443_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ead3e693a1caf5b1f180540b79254443_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ead3e693a1caf5b1f180540b79254443_JaffaCakes118
-
Size
240KB
-
MD5
ead3e693a1caf5b1f180540b79254443
-
SHA1
9efc46c0f6c9f949bd438419cd84c5bc99893e2c
-
SHA256
e28f0aa659d654dcb2b2f2b8241605b12d5ec64e728af8e4fde0d2b039c1727a
-
SHA512
d6e5a4b048d05186b91a1f5007477c3d7c94137eeffc7e4e08284826005300e266c05c31a65cf037bf627c4432991d8773f90f5a2e34d2c7e3b89a3f8662b7ad
-
SSDEEP
3072:L29fHPGOl8QR13yYyW67RLT7cuxOXE85rwV9b1n3s3A:L293KQL3DG8iOXE8dw71ne
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ead3e693a1caf5b1f180540b79254443_JaffaCakes118
Files
-
ead3e693a1caf5b1f180540b79254443_JaffaCakes118.exe windows:5 windows x86 arch:x86
ea1e7432a5e085801d63e52f1db755f8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenW
DisconnectNamedPipe
GetTapeStatus
MoveFileW
DisableThreadLibraryCalls
LocalAlloc
GetNumberFormatW
FoldStringW
EnumDateFormatsA
GetThreadPriorityBoost
VirtualProtect
GetShortPathNameW
SetCalendarInfoA
DeleteTimerQueueTimer
GetFileInformationByHandle
DebugBreak
FindNextVolumeA
LCMapStringW
SetTimeZoneInformation
GetFileAttributesW
FindNextVolumeW
FreeConsole
GetSystemPowerStatus
GlobalAlloc
GetThreadSelectorEntry
GetVolumePathNameW
CreateRemoteThread
CreateDirectoryExA
SetThreadExecutionState
VirtualQuery
lstrlenA
EnumCalendarInfoA
GetPrivateProfileSectionNamesW
FreeEnvironmentStringsW
ExitProcess
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
SetFilePointer
CloseHandle
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetProcAddress
GetModuleHandleW
WriteFile
GetModuleFileNameW
GetModuleFileNameA
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
HeapReAlloc
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
ReadFile
LoadLibraryW
WriteConsoleW
CreateFileW
gdi32
GetEnhMetaFileHeader
SelectObject
EnumFontFamiliesExA
GetTextCharacterExtra
GetBrushOrgEx
CreateEnhMetaFileA
advapi32
FreeSid
RevertToSelf
GetServiceDisplayNameW
RegDeleteValueW
CreateProcessAsUserW
EqualSid
QueryServiceLockStatusA
SetServiceObjectSecurity
OpenSCManagerW
RegSetValueExW
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 87.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ