Static task
static1
Behavioral task
behavioral1
Sample
eb5adaf9fae6aa52a21a33323d693f68_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb5adaf9fae6aa52a21a33323d693f68_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb5adaf9fae6aa52a21a33323d693f68_JaffaCakes118
-
Size
252KB
-
MD5
eb5adaf9fae6aa52a21a33323d693f68
-
SHA1
337df7fef5722475658534e0d55069efaa26d479
-
SHA256
e015c08f6fd48593057cd2e5a6646c8435e0e480f169dcc4bba58cbc70d592bc
-
SHA512
30454b5d84886608a54571052a1d3e58cebb5ee85df3d520a7a66285ea39536a2705b61b023deaf2ef1cdcf80f7bdb49db81b0ffca764051a50868486561c050
-
SSDEEP
3072:LIGCarBdfkR6s9jYnC0C5PYT/uS6FEeEgqCDfwrMUEy55hsuF0AWmtgdVm:e6Hfts9jYnerS/7g1rwRCuq9nd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb5adaf9fae6aa52a21a33323d693f68_JaffaCakes118
Files
-
eb5adaf9fae6aa52a21a33323d693f68_JaffaCakes118.exe windows:4 windows x86 arch:x86
65f263895567b3adac89fa3b43930803
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
FindClose
CloseHandle
GetTempPathW
LoadLibraryA
GetModuleHandleW
GetTempPathA
CreateFileW
CreateFileA
GetFileType
GetStartupInfoA
user32
CloseClipboard
BeginPaint
GetWindowRect
IsWindowEnabled
GetWindow
gdi32
DeleteDC
FillRgn
CreateRoundRectRgn
CreateDCA
msvcrt
_controlfp
_except_handler3
strlen
strcmp
strstr
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
Sections
.text Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1004B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE