Static task
static1
Behavioral task
behavioral1
Sample
eaed13b7cebaf73037d3c3b483ee4fa1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaed13b7cebaf73037d3c3b483ee4fa1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eaed13b7cebaf73037d3c3b483ee4fa1_JaffaCakes118
-
Size
664KB
-
MD5
eaed13b7cebaf73037d3c3b483ee4fa1
-
SHA1
cdbb2c78da2f84fdc99cf6e5f4de0afa1307a7b6
-
SHA256
328581000ecb561ab00f900f5c70b43d480aea3f5d0aa1274c1777439f8da784
-
SHA512
459afdcdd0d1a5a022c99b0bcede4ec7821b8c82cc37dc6fc983e26a4dcc26a3ac52d13315ea390e02f1199acaed106965871514acd7c009e3c77af6eff49f12
-
SSDEEP
6144:ksfs81L+L6EPDK6Uqq2dgZQQ8Hj0ZTXQ2iojFAG+aQ4kC7A5XloFCm:kM++QK6Uqq2dkQhHjWQoJ+aQ1NXaX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eaed13b7cebaf73037d3c3b483ee4fa1_JaffaCakes118
Files
-
eaed13b7cebaf73037d3c3b483ee4fa1_JaffaCakes118.exe windows:4 windows x86 arch:x86
2d07d96398fff33f0a54e7afc6ff0ff4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsValidLocale
SetCurrentDirectoryA
GetCurrentDirectoryA
CompareStringW
CompareStringA
FindFirstFileA
GetDriveTypeA
FileTimeToLocalFileTime
IsValidCodePage
FindClose
SetStdHandle
ReadFile
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
IsBadCodePtr
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
GetVersionExA
GetTimeZoneInformation
CreateFileA
SetEndOfFile
GetLocaleInfoW
CopyFileA
FormatMessageA
MultiByteToWideChar
CreateDirectoryA
GetFullPathNameA
CreateMutexA
GetLastError
ResumeThread
Sleep
TerminateThread
FileTimeToSystemTime
CreateThread
SetConsoleCtrlHandler
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
HeapReAlloc
HeapAlloc
SetEnvironmentVariableA
CloseHandle
RtlUnwind
ExitProcess
TerminateProcess
GetCurrentProcess
RaiseException
DeleteFileA
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
GetProcAddress
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
HeapFree
SetUnhandledExceptionFilter
GetCPInfo
GetACP
GetOEMCP
SetFilePointer
FlushFileBuffers
user32
InvalidateRect
GetDC
PostMessageA
MessageBoxA
ReleaseDC
DispatchMessageA
CreateWindowExA
UpdateWindow
ShowWindow
EnableWindow
GetDlgItem
SendMessageA
LoadBitmapA
RegisterClassExA
LoadIconA
LoadCursorA
BeginPaint
TranslateMessage
EndPaint
DefWindowProcA
RedrawWindow
PostQuitMessage
GetSystemMetrics
GetMessageA
SetWindowTextA
gdi32
CreateSolidBrush
CreateHatchBrush
CreatePen
CreatePatternBrush
SelectObject
Rectangle
DeleteObject
SetBkMode
SetTextColor
RoundRect
Ellipse
CreateCompatibleDC
BitBlt
DeleteDC
MoveToEx
LineTo
GetStockObject
SetBkColor
TextOutA
CreateFontA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
wininet
InternetReadFile
InternetQueryDataAvailable
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
InternetOpenA
InternetCheckConnectionA
Sections
.text Size: 536KB - Virtual size: 534KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE