Static task
static1
Behavioral task
behavioral1
Sample
eb32457a28815a2dc5ca1050ff500716_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb32457a28815a2dc5ca1050ff500716_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb32457a28815a2dc5ca1050ff500716_JaffaCakes118
-
Size
110KB
-
MD5
eb32457a28815a2dc5ca1050ff500716
-
SHA1
c6067cdd5c902b2d21c0a98e795f9234884d9a6b
-
SHA256
8762d65b1a7c51d16d041436f3fecc1707b87a6706fffaf5a668dfb1adb10559
-
SHA512
1dd5b72977157186ba10806b82b2e760fdc1bc63f98e68fcbc4da2262d8f9194ae8c30363b8f614a4ba69488bfa16812c3874a7326cd8eb999508ea5fc2bb88b
-
SSDEEP
3072:qTLituRA0m03jPhpwPK8SyZm6WF/ZR/9YB0o:10FP7mBSl6eR/9Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb32457a28815a2dc5ca1050ff500716_JaffaCakes118
Files
-
eb32457a28815a2dc5ca1050ff500716_JaffaCakes118.exe windows:4 windows x86 arch:x86
892cc62a9cd22e645e3eb804a60ab5e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
SafeArrayCreate
SafeArrayGetUBound
RegisterTypeLib
SafeArrayUnaccessData
OleLoadPicture
VariantChangeType
user32
GetWindowThreadProcessId
EndPaint
GetCapture
OpenClipboard
CharLowerBuffA
MessageBeep
SetClipboardData
DrawIconEx
ActivateKeyboardLayout
LoadStringA
InsertMenuItemA
DestroyWindow
ChildWindowFromPoint
SetWindowLongW
SetClassLongA
SetScrollRange
GetKeyState
FindWindowA
MsgWaitForMultipleObjects
IsWindowEnabled
GetMenuItemID
DrawMenuBar
GetActiveWindow
GetKeyboardState
GetCursor
WindowFromPoint
IsIconic
SetPropA
GetMenuItemInfoA
GetClipboardData
CloseClipboard
SetTimer
DestroyMenu
GetWindowDC
IsRectEmpty
ScreenToClient
SendMessageA
PtInRect
GetMenu
GetParent
TranslateMDISysAccel
GetTopWindow
CallNextHookEx
UpdateWindow
SetParent
ReleaseDC
RegisterClassA
GetClassLongA
SystemParametersInfoA
GetMenuItemCount
GetDC
GetWindowLongA
GetWindowTextA
GetClassInfoA
DestroyCursor
SetWindowTextA
BeginPaint
IsZoomed
GetClientRect
IsWindowVisible
GetClassNameA
CharLowerA
GetCursorPos
OffsetRect
GetKeyboardLayoutList
AdjustWindowRectEx
GetLastActivePopup
EnumChildWindows
LoadCursorA
SetRect
SetWindowsHookExA
GetKeyboardLayout
DrawTextA
GetSysColorBrush
DrawAnimatedRects
GetPropA
CreatePopupMenu
CharToOemA
GetSysColor
MoveWindow
IsDialogMessageW
DispatchMessageW
DrawEdge
GetWindowPlacement
GetWindowLongW
GetFocus
CharNextA
GetScrollRange
GetDCEx
GetScrollPos
WaitMessage
EnableMenuItem
EmptyClipboard
UnregisterClassA
RegisterWindowMessageA
GetMenuStringA
IsWindow
GetForegroundWindow
MessageBoxA
ole32
WriteClassStm
MkParseDisplayName
CoGetMalloc
CoReleaseMarshalData
CreateBindCtx
CoCreateInstanceEx
CoRegisterClassObject
CoTaskMemFree
CoRevokeClassObject
CoDisconnectObject
version
VerQueryValueA
GetFileVersionInfoA
VerFindFileA
shell32
SHGetFileInfoA
Shell_NotifyIconA
DragQueryFileA
gdi32
GetBitmapBits
SelectPalette
CreateBitmap
SetBkColor
SaveDC
GetPaletteEntries
CreatePalette
BitBlt
GetDIBits
kernel32
SetEvent
ExitProcess
GetModuleHandleA
GetLocalTime
VirtualAllocEx
Sleep
GetFileType
GetLastError
lstrlenA
GetCPInfo
lstrcatA
ExitThread
LockResource
LocalFree
GlobalAlloc
WriteFile
GetProcAddress
Sections
CODE Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE