Static task
static1
Behavioral task
behavioral1
Sample
eb52da90f75ae832560266690ab5eb46_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb52da90f75ae832560266690ab5eb46_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb52da90f75ae832560266690ab5eb46_JaffaCakes118
-
Size
252KB
-
MD5
eb52da90f75ae832560266690ab5eb46
-
SHA1
72b1be7f0f01023462344c025208a36f40da76fd
-
SHA256
4f3d778a93b2d901155e8dc0cfcf241b9d1b031b55da83402c746eb3e298adb8
-
SHA512
b2ca9fd2f254ed3f2759c1fff566068603b785f56e69969a835c484f5cafd10120d24f48204cd026564103dc3f0e436a57b1a5c202448b29233816315c73ded7
-
SSDEEP
6144:Wg9SJ3GmB+gw8quOMdwD5xTse7P+BMbA5QwEgNV0gShqlHfl:zSJWmMB6OM6VxAeD+qbA5LEgNKhCHfl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb52da90f75ae832560266690ab5eb46_JaffaCakes118
Files
-
eb52da90f75ae832560266690ab5eb46_JaffaCakes118.exe windows:4 windows x86 arch:x86
d9e532bee60319c34dd4f051b70ae406
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
htons
inet_addr
gethostname
gethostbyname
iphlpapi
GetBestInterface
GetIpAddrTable
kernel32
GetProcessHeap
TlsAlloc
InitializeCriticalSection
WaitForSingleObject
lstrcpyW
lstrlenW
GetLastError
CreateEventW
CreateMutexW
GetCurrentProcessId
FreeLibrary
GlobalAlloc
LoadLibraryW
ExpandEnvironmentStringsW
SetEvent
GetModuleHandleW
GetVersionExW
GetModuleFileNameW
ExitProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetCurrentThreadId
FatalAppExitA
HeapCreate
Sleep
GetFileAttributesW
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetCurrentThread
GetModuleHandleA
GetStartupInfoA
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
LoadLibraryA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
IsValidLocale
GetLocaleInfoW
GetVersion
GetProcAddress
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
netapi32
NetReplGetInfo
NetUseGetInfo
user32
CharNextA
GetMenuStringA
SetWindowTextA
WaitMessage
CreateDialogParamA
DialogBoxIndirectParamW
GetCapture
CreatePopupMenu
LoadBitmapA
CharNextW
SetFocus
SendMessageW
GetActiveWindow
CharLowerA
CreateWindowExW
InsertMenuItemA
GetKeyboardLayout
IsMenu
SetCursor
GetMenuItemInfoA
RegisterWindowMessageA
CharUpperW
LoadMenuA
SetCapture
CopyIcon
LoadMenuIndirectA
EmptyClipboard
SetDlgItemInt
CreateWindowExA
SetForegroundWindow
ShowWindow
DefWindowProcW
GetMenu
GetWindowRgn
TrackPopupMenu
PostQuitMessage
GetCursorPos
gdi32
GetStockObject
RemoveFontResourceW
CreateBitmap
DeleteObject
CreateFontW
CreateDIBPatternBrushPt
CreateScalableFontResourceW
Sections
.edata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.aaIrfj Size: 104KB - Virtual size: 187KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.E Size: 110KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ