Static task
static1
Behavioral task
behavioral1
Sample
eed465e1cbd9616a813e3c88aef4b9f3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eed465e1cbd9616a813e3c88aef4b9f3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eed465e1cbd9616a813e3c88aef4b9f3_JaffaCakes118
-
Size
157KB
-
MD5
eed465e1cbd9616a813e3c88aef4b9f3
-
SHA1
3decfbd75eb96351d026ce96426b3e3244322e1e
-
SHA256
16531148a8bb4d306e2d2cb894ed40e126677aca03e8e3292ecd365b7beaa18f
-
SHA512
53e9ec139d551a93e32b60c033792be3918f5994a046c12f699281b1d6f981124ce99f791e0e20e2db25bea19beb1864de110c80cd0efbf00f724de1cb6f275c
-
SSDEEP
3072:LAfCoh2IC0g0LSHGZH6xM04hnhjOryva0A7XX9x1SX/ujnW:KCs2DruzaO0Mn0oDAr1guT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eed465e1cbd9616a813e3c88aef4b9f3_JaffaCakes118
Files
-
eed465e1cbd9616a813e3c88aef4b9f3_JaffaCakes118.exe windows:4 windows x86 arch:x86
69f3fa76b0184c3adff8b370d2c02141
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
SetEnvironmentVariableW
GetNextVDMCommand
GetLocalTime
LocalFileTimeToFileTime
FindClose
LoadResource
SetThreadPriority
FreeLibrary
FindNextFileW
CompareStringA
FindFirstFileW
SystemTimeToFileTime
SetCurrentDirectoryW
EnumResourceNamesW
RegisterWaitForSingleObject
GetStringTypeW
SetErrorMode
FileTimeToSystemTime
GetShortPathNameW
FindResourceW
FileTimeToLocalFileTime
SearchPathW
user32
RealGetWindowClassA
ExcludeUpdateRgn
InvalidateRgn
ValidateRgn
SetCapture
GetCapture
ReleaseCapture
ValidateRect
GetUpdateRgn
Sections
.text Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imul Size: 1024B - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ