Static task
static1
Behavioral task
behavioral1
Sample
eb603da7a51ec32d15cc302ab67c9cfc_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eb603da7a51ec32d15cc302ab67c9cfc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb603da7a51ec32d15cc302ab67c9cfc_JaffaCakes118
-
Size
94KB
-
MD5
eb603da7a51ec32d15cc302ab67c9cfc
-
SHA1
34a3ef051a4989ed78c012f8ae7cdc9629d177c8
-
SHA256
c0942f60430634e01d86aab75fcb706f134765a7707188fe1e4654502631d496
-
SHA512
919eac54db65077f1e969c31e27d2e7d48577edfb7bfc87838410490cad3c3334d2f89fdaefe8eb5d2d28c58731a8953b84656ccc0eb8060014a5b6ec4a11592
-
SSDEEP
768:jsJk55Di82SnjAk1tW1x+P/YGT0tZmaXrSpljgKj+a0XM25n4Lox2ha5JqHUZW0Z:jsYrDW1x+HYjOlkKj+1M8n4VCS/0Oa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb603da7a51ec32d15cc302ab67c9cfc_JaffaCakes118
Files
-
eb603da7a51ec32d15cc302ab67c9cfc_JaffaCakes118.exe windows:4 windows x86 arch:x86
674180e5037d2bcdfa87e0b40cc8ff8b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
VirtualFree
GetCurrentProcess
ResetEvent
OpenProcess
DeviceIoControl
CreateEventA
WinExec
ExitProcess
DeleteFileA
GetProcAddress
LoadLibraryA
GetTickCount
TerminateThread
WaitForSingleObject
CreateThread
OutputDebugStringA
GetTempFileNameA
GetTempPathA
GetSystemDirectoryA
GetComputerNameA
GetPrivateProfileIntA
CreateDirectoryA
GetPrivateProfileStringA
CreateFileA
GetModuleFileNameA
GetStringTypeA
ReadFile
SetEndOfFile
GetOEMCP
GetLastError
CloseHandle
GetLocalTime
FindResourceA
LoadResource
SizeofResource
CopyFileA
LockResource
GetACP
GetStringTypeW
GetCPInfo
LCMapStringW
LCMapStringA
SetStdHandle
HeapReAlloc
MultiByteToWideChar
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
HeapFree
WriteFile
FlushFileBuffers
TerminateProcess
SetHandleCount
GetStdHandle
GetFileType
SetFilePointer
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
HeapAlloc
VirtualAlloc
user32
ExitWindowsEx
GetForegroundWindow
MessageBoxA
advapi32
RegSetValueExA
RegCloseKey
RegDeleteKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyA
psapi
GetModuleFileNameExA
shlwapi
PathAppendA
PathIsDirectoryA
PathCombineA
urlmon
URLDownloadToFileA
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MJ0011 Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
VEIData Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE