Static task
static1
Behavioral task
behavioral1
Sample
ebb7750bc800c72a79a7aa22a4f26805_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebb7750bc800c72a79a7aa22a4f26805_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ebb7750bc800c72a79a7aa22a4f26805_JaffaCakes118
-
Size
135KB
-
MD5
ebb7750bc800c72a79a7aa22a4f26805
-
SHA1
067e613c61087535d9d49413c76f621637309830
-
SHA256
cfa5c25df87b666482d134df4bd9c6c2054ff92672a055212e408ae18f0d101b
-
SHA512
86768a2dc27485d609f8ffe9576faf7fc680f8d1ecc938ef227f9d6bafffc796b1a89d82d42db7d3ee03419a1403d86b1564d1e7f5f401944eab36caad949411
-
SSDEEP
1536:4SnWnZAH5YTJuIcntCRRp1jq9gBuQYnQw75h3vZxiCk3uENF3kUUejS:snOHLtCaQYQs5h3vPiVugF3rJG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ebb7750bc800c72a79a7aa22a4f26805_JaffaCakes118
Files
-
ebb7750bc800c72a79a7aa22a4f26805_JaffaCakes118.exe windows:4 windows x86 arch:x86
af38bbd4302e58c27f6759923cca3e41
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextFileA
FindClose
GetTempPathA
GetTempFileNameA
MoveFileExA
GetShortPathNameA
GetWindowsDirectoryA
GetPrivateProfileSectionA
DeleteFileA
WritePrivateProfileSectionA
lstrcpyA
GetCurrentProcess
GetLastError
OpenEventA
SetEvent
CloseHandle
GetModuleFileNameA
OpenProcess
WaitForSingleObject
Sleep
GetTickCount
IsDBCSLeadByte
GlobalSize
CreateFileA
GlobalFree
WriteFile
GetCurrentProcessId
CopyFileA
CreateEventA
CreateProcessA
VirtualProtect
WinExec
GetVersionExA
GetFileSize
GlobalAlloc
lstrcmpA
ReadFile
FindFirstFileA
LocalFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetEndOfFile
HeapSize
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
InitializeCriticalSection
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
SetFilePointer
lstrlenA
lstrcmpiA
lstrcatA
SetFileAttributesA
GetFileAttributesA
lstrcpynA
RemoveDirectoryA
SetCurrentDirectoryA
GetCurrentDirectoryA
FreeLibrary
GetProcAddress
LCMapStringA
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
LocalAlloc
LoadLibraryA
HeapAlloc
HeapFree
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
RtlUnwind
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
MultiByteToWideChar
VirtualFree
VirtualAlloc
HeapReAlloc
HeapDestroy
HeapCreate
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
user32
DestroyWindow
SetWindowPos
GetWindowLongA
AdjustWindowRect
MapDialogRect
SetRect
IsDlgButtonChecked
GetClientRect
PostQuitMessage
PeekMessageA
CharPrevA
ShowWindow
SendDlgItemMessageA
CreateDialogParamA
MessageBoxA
DispatchMessageA
TranslateMessage
IsDialogMessageA
GetMessageA
SetDlgItemTextA
ExitWindowsEx
GetDlgItem
SetWindowTextA
wsprintfA
LoadStringA
comdlg32
GetFileTitleA
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegEnumKeyExA
RegDeleteKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueExA
shell32
SHChangeNotify
SHGetPathFromIDListA
SHGetSpecialFolderLocation
comctl32
ord8
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ