Static task
static1
Behavioral task
behavioral1
Sample
eeddd8450e74b4e9baa37e23d2764a49_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eeddd8450e74b4e9baa37e23d2764a49_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eeddd8450e74b4e9baa37e23d2764a49_JaffaCakes118
-
Size
310KB
-
MD5
eeddd8450e74b4e9baa37e23d2764a49
-
SHA1
9df112a1e20f1da0e80514a1e49b0550d09597b7
-
SHA256
59e67f3fe8ab36b56855156e4c753e18a3541a3253e57c6da530ab62090988ae
-
SHA512
3d2668bd38c8c592210f07638f867c6024f2635489c149439ed79591982aa4569498ae52a2c3be96de6828eebd369779833c2073dba3ce1fd8468a0f2d755b03
-
SSDEEP
3072:eB966sH7YUFe5oerWC3CwSjqFxYnqFJkQ1VVdcXTxZ0NQbUnpdgrHHyqbkV/W0na:erVrWC3CwSOFOqFnxKXTVUskQ09
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eeddd8450e74b4e9baa37e23d2764a49_JaffaCakes118
Files
-
eeddd8450e74b4e9baa37e23d2764a49_JaffaCakes118.exe windows:5 windows x86 arch:x86
73bec5c9d89240a1f7d3ddb2741d467b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
ExitProcess
DeviceIoControl
DisableThreadLibraryCalls
DefineDosDeviceW
SetLastError
lstrcatW
UnhandledExceptionFilter
lstrcpynW
GlobalGetAtomNameW
FindResourceA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
LoadLibraryA
GetProcAddress
SizeofResource
LockResource
VirtualAlloc
GetCommandLineA
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleW
Sleep
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
HeapReAlloc
RtlUnwind
HeapSize
GetLocaleInfoA
user32
SendMessageTimeoutW
TranslateAcceleratorW
GetWindowPlacement
GetDlgItem
IsClipboardFormatAvailable
GetDesktopWindow
GetCursorPos
WindowFromPoint
GetWindowRgn
IsChild
LoadIconW
GetCapture
gdi32
CreateRectRgn
GetTextFaceW
FrameRgn
advapi32
OpenProcessToken
Sections
.data Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 239KB - Virtual size: 238KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ