Static task
static1
Behavioral task
behavioral1
Sample
eece46590f109cc315109bc8d2350cb4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eece46590f109cc315109bc8d2350cb4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eece46590f109cc315109bc8d2350cb4_JaffaCakes118
-
Size
16.2MB
-
MD5
eece46590f109cc315109bc8d2350cb4
-
SHA1
444fcc859aba19d5ab0490b8eceb9702f265d1d6
-
SHA256
138e984e8bb5215924b7b529e61d948ba72c15fd8d0aafd051188d17b6198001
-
SHA512
634ecdcf8d4e2e3dc53c063398f8ab0146081033469823479b7d6e117dedebfbf5c47419f413707f4920ec141cc7601980b22376050fea651ab556043726aec1
-
SSDEEP
393216:msunGNq9ovJ3CAYZGt0R4MBdtzx63AXjdHuFd:msmGQvdvRVDx63AXj1Yd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eece46590f109cc315109bc8d2350cb4_JaffaCakes118
Files
-
eece46590f109cc315109bc8d2350cb4_JaffaCakes118.exe windows:4 windows x86 arch:x86
39fd9c4ede4cf67364b61bd6ee17355a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetExitCodeProcess
GetLastError
CreatePipe
ReadFile
PeekNamedPipe
WaitForSingleObject
GlobalFree
GlobalUnlock
GlobalHandle
GetCommandLineW
GetCommandLineA
LoadLibraryW
GetModuleHandleW
GetVersionExA
GetCurrentProcess
GetCurrentThread
GetProcAddress
FindClose
FindNextFileA
FindFirstFileA
GetModuleFileNameA
CreateThread
GetEnvironmentVariableA
SetEndOfFile
SetFilePointer
UnmapViewOfFile
CreateProcessA
GetStdHandle
GetFileSize
CreateFileA
lstrcatA
GetWindowsDirectoryA
GetShortPathNameA
CreateDirectoryA
DeleteFileA
SleepEx
GetTempFileNameA
GetFileAttributesA
GetTempPathA
GetDiskFreeSpaceA
WideCharToMultiByte
SetEnvironmentVariableA
GetDriveTypeA
GetLogicalDriveStringsA
RemoveDirectoryA
SetFileAttributesA
GetTickCount
ResumeThread
SetPriorityClass
SetThreadPriority
MoveFileExA
LocalFree
FormatMessageA
Sleep
CreateFileMappingA
MapViewOfFile
SetConsoleCtrlHandler
GetModuleHandleA
SetCurrentDirectoryA
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetCPInfo
SetStdHandle
IsBadCodePtr
IsBadReadPtr
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
LoadLibraryA
GetTimeZoneInformation
GetStartupInfoA
CloseHandle
GetVersion
FreeEnvironmentStringsA
UnhandledExceptionFilter
FreeEnvironmentStringsW
LCMapStringA
MultiByteToWideChar
LCMapStringW
HeapReAlloc
TerminateProcess
HeapSize
SetHandleCount
WriteFile
GetFileType
SetUnhandledExceptionFilter
FatalAppExitA
FlushFileBuffers
EnterCriticalSection
DeleteCriticalSection
CompareStringW
CompareStringA
GetLocaleInfoW
RtlUnwind
RaiseException
InterlockedDecrement
InterlockedIncrement
GetCurrentDirectoryA
GetEnvironmentStrings
GetEnvironmentStringsW
TlsSetValue
LeaveCriticalSection
ExitProcess
HeapAlloc
HeapFree
GetCurrentThreadId
TlsAlloc
TlsFree
SetLastError
TlsGetValue
InitializeCriticalSection
user32
DispatchMessageW
ExitWindowsEx
DispatchMessageA
TranslateMessage
GetWindowRect
LoadStringA
wsprintfA
MoveWindow
GetParent
GetSystemMetrics
DestroyWindow
DefWindowProcA
DefWindowProcW
CreateWindowExA
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
KillTimer
PostMessageA
SetWindowTextA
GetWindowTextA
MessageBoxA
IsWindowVisible
EnableWindow
SetTimer
ShowWindow
GetDlgItem
SendMessageA
SetDlgItemTextA
GetMessageA
GetMessageW
IsDialogMessageA
CreateDialogParamA
PostQuitMessage
IsWindow
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shell32
SHGetMalloc
SHBrowseForFolderA
SHGetPathFromIDListA
CommandLineToArgvW
ole32
CoInitialize
CoUninitialize
Sections
.text Size: 132KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ