Static task
static1
Behavioral task
behavioral1
Sample
eeadfaa7ca8108d7fc89a1aae49596d2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eeadfaa7ca8108d7fc89a1aae49596d2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eeadfaa7ca8108d7fc89a1aae49596d2_JaffaCakes118
-
Size
86KB
-
MD5
eeadfaa7ca8108d7fc89a1aae49596d2
-
SHA1
1dae625f3577f6c8befea53137de22d9e76ccf32
-
SHA256
ba2cf2ade09c3cdd11b18500fb7889f30feb5d1f9e675c45b30535556792eb5b
-
SHA512
d418fcf04f3305ebe6b0731a42dd559039c424b4b2de93d6b8ee2ceedb22904d3833748d7034a582cb3179fc6d3758c50d7321c1ab274b77431acb71143f3dba
-
SSDEEP
1536:kckNWAbTXW9A29pIdF4UqVK2Yv/kbveLlDNKBctSvlri+Dy+HLgayn7QWCRwhV:kckNrTXW9AZL4gL3EvqlRscUBiyy4uL7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eeadfaa7ca8108d7fc89a1aae49596d2_JaffaCakes118
Files
-
eeadfaa7ca8108d7fc89a1aae49596d2_JaffaCakes118.exe windows:5 windows x86 arch:x86
8c1b69610e31fced31bf69c00bae4bfa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasesLengthA
GetPrivateProfileIntW
LoadLibraryA
GetUserGeoID
SetStdHandle
LocalAlloc
GetConsoleCursorInfo
ReplaceFileA
MoveFileExA
GetNumaHighestNodeNumber
FindClose
WaitNamedPipeA
VirtualAlloc
OpenProcess
SetTermsrvAppInstallMode
UTRegister
CancelDeviceWakeupRequest
VirtualUnlock
IsSystemResumeAutomatic
msvcrt40
??0strstream@@QAE@PADHH@Z
??5istream@@QAEAAV0@PAE@Z
malloc
??_Gistream@@UAEPAXI@Z
_getmbcp
?precision@ios@@QAEHH@Z
strerror
_mbscmp
strcat
_winmajor
??0streambuf@@IAE@PADH@Z
fprintf
rpcrt4
NdrConformantVaryingStructFree
NdrCStdStubBuffer2_Release
RpcMgmtInqServerPrincNameA
RpcCancelThread
pfnMarshallRoutines
NdrComplexArrayUnmarshall
NdrStubCall
CStdStubBuffer_Invoke
RpcRaiseException
I_RpcEnableWmiTrace
NdrGetSimpleTypeBufferAlignment
NdrCorrelationPass
float_array_from_ndr
RpcObjectInqType
expsrv
__vbaVarAnd
__vbaR8Str
__vbaVarSetObjAddref
SetMemNewObj
__vbaGet3
__vbaRefVarAry
__vbaForEachAry
__vbaI4Var
__vbaR8Cy
__vbaVarCmpEq
__vbaHresultCheckNonvirt
Zombie_GetTypeInfo
rtcGetSetting
rtcUpperCaseBstr
_adj_fdivr_m64
__vbaStrCmp
pdh
PdhGetDefaultPerfObjectA
PdhAdd009CounterA
PdhVbGetDoubleCounterValue
PdhLookupPerfIndexByNameW
PdhAddCounterW
PdhRelogA
PdhOpenLogA
PdhListLogFileHeaderA
PdhGetDataSourceTimeRangeA
PdhSelectDataSourceW
PdhValidatePathA
PdhConnectMachineA
PdhParseInstanceNameA
PdhBrowseCountersHA
PdhEnumLogSetNamesW
PdhEnumMachinesW
PdhAdd009CounterW
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 288B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ