Static task
static1
Behavioral task
behavioral1
Sample
ee7da2825e7060c1221b52618dd5089f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee7da2825e7060c1221b52618dd5089f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ee7da2825e7060c1221b52618dd5089f_JaffaCakes118
-
Size
1.1MB
-
MD5
ee7da2825e7060c1221b52618dd5089f
-
SHA1
d27c641040806620700f2018ebc47517cde06e22
-
SHA256
9febcb24975cb4331435a3c6eea70f43ead557e2deb7f14a17c1d9301dafe198
-
SHA512
28e37209263fb4ec5546696c4de990e5d44f98d6ec9031e22370cbc355de3c9af0b167112656e4efc40073bb1ee4e8cdd54b87fb6c44a07fe33475d2d441fefa
-
SSDEEP
24576:WJ8soOZB/bGLxa6rY89aSGrWwIJ0+Aoa7w74DwpNpqZ:uD/B/LSAWwK0+AF6pa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ee7da2825e7060c1221b52618dd5089f_JaffaCakes118
Files
-
ee7da2825e7060c1221b52618dd5089f_JaffaCakes118.exe windows:8 windows x86 arch:x86
573381e2d20116db8ef077a217516e7d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetHandleInformation
HeapAlloc
CallNamedPipeA
FileTimeToLocalFileTime
GetFileTime
lstrcpyA
CreateFileMappingA
DisconnectNamedPipe
CreateMutexA
HeapSummary
ConnectNamedPipe
SetNamedPipeHandleState
LeaveCriticalSection
UnmapViewOfFile
MapViewOfFile
ExitProcess
DosDateTimeToFileTime
HeapCreate
HeapValidate
GetNamedPipeInfo
HeapFree
GetNamedPipeHandleStateA
ReadFileEx
SetFilePointer
HeapLock
LoadLibraryA
CreateFileA
CreateNamedPipeA
FlushViewOfFile
HeapUnlock
InitializeCriticalSection
EnterCriticalSection
GetFileAttributesA
ReadFile
GetCurrentDirectoryA
WriteFile
ReadFileScatter
HeapDestroy
Sections
.text Size: 983KB - Virtual size: 983KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrcs Size: 15KB - Virtual size: 420KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ