Static task
static1
Behavioral task
behavioral1
Sample
eb70dcaeae24f65cba44d988f432233b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb70dcaeae24f65cba44d988f432233b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb70dcaeae24f65cba44d988f432233b_JaffaCakes118
-
Size
1.3MB
-
MD5
eb70dcaeae24f65cba44d988f432233b
-
SHA1
e32ecf0e9880c42b051ea047ff826ca885656cc9
-
SHA256
a25d4d53ccdf029ea04cd048be40e64f74c9e208d74d780814615832374c23f2
-
SHA512
2ae143b5492a329ea1420f6bcd3d81f8f34a8220a47e01d326f7b4b60b25a93fa572d63246cc1bb0ff78ef7cd09cd5dcf49f66a3d7d65c07c89631e92689b7fc
-
SSDEEP
24576:pB8ubRe7kwdXBtRprjR3TXeJqxI77qo30P+Z5jyyvd3O20iwCvIviPallxzwe:v8iQwwvrrTXeJMy7H34+Z5jy4d3/wCAj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb70dcaeae24f65cba44d988f432233b_JaffaCakes118
Files
-
eb70dcaeae24f65cba44d988f432233b_JaffaCakes118.exe windows:6 windows x86 arch:x86
5cecb3ef4debb9a9bab8fc782400f339
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
FindFirstFileA
FindNextFileA
FindClose
DuplicateHandle
GetCurrentProcess
CreateMutexA
WaitForSingleObject
ReleaseMutex
UnmapViewOfFile
CreateSemaphoreA
ReleaseSemaphore
CreateFileMappingA
MapViewOfFileEx
CreateFileA
GetCurrentProcessId
GetFileSizeEx
CreateDirectoryA
RemoveDirectoryA
SetEndOfFile
SetFilePointerEx
WriteFile
GetProcAddress
GetModuleHandleA
GetTickCount
GetModuleHandleW
VirtualProtect
GetConsoleWindow
CreateFileW
HeapSize
SetStdHandle
GetProcessTimes
GetCurrentThreadId
Sleep
SwitchToThread
LocalFree
FormatMessageA
SetLastError
GetSystemInfo
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
InitializeSListHead
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
RtlUnwind
InterlockedPushEntrySList
RaiseException
FreeLibrary
LoadLibraryExW
VirtualAlloc
VirtualQuery
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
HeapReAlloc
GetFileType
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
ReadConsoleW
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
WriteConsoleW
user32
ShowWindow
advapi32
OpenEventLogA
CloseEventLog
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
ReadEventLogA
Sections
.text Size: 593KB - Virtual size: 592KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 599KB - Virtual size: 606KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 792B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ