Static task
static1
Behavioral task
behavioral1
Sample
eac45dcaae4e2eee12b5c96c8284edad_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac45dcaae4e2eee12b5c96c8284edad_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eac45dcaae4e2eee12b5c96c8284edad_JaffaCakes118
-
Size
83KB
-
MD5
eac45dcaae4e2eee12b5c96c8284edad
-
SHA1
c535534986b4433ceeeefc8bc52e1f55e55cc1e0
-
SHA256
29b292078a3f7d7acb1a5bcea8b60186e3207f32fa069900336f70c5347fafbe
-
SHA512
5701c75b7714802d798d0c2e97ecee4def8236610148eb2ec060ff2aa324a4cfe943643b718b8740c25bfd945581906c3cb7cc12e6c9484dd7dc6a18b3f5f1c0
-
SSDEEP
1536:FUe418wMvcxVmgkXlcpCz6rSfyTVXUTagiqQN3hhWVv5kDv:6e4OwUQmgkVcpCa0iV6Dk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eac45dcaae4e2eee12b5c96c8284edad_JaffaCakes118
Files
-
eac45dcaae4e2eee12b5c96c8284edad_JaffaCakes118.exe windows:4 windows x86 arch:x86
264b8b6eb95713c8aadb1cd87cb22ccb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawIcon
DrawStateA
DestroyCaret
EnableScrollBar
EndMenu
EqualRect
FillRect
CreatePopupMenu
CreateMenu
CreateMDIWindowA
CreateDesktopW
CreateCursor
CharToOemBuffA
CharToOemA
EnableMenuItem
CharPrevA
kernel32
lstrcpynA
SetEndOfFile
SetCurrentDirectoryA
ReadFile
GetSystemTime
GetPrivateProfileStringA
EnumResourceNamesA
lstrlenA
Sections
.text Size: 1024B - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 65KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data0 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE