Static task
static1
Behavioral task
behavioral1
Sample
ef610b2e78ffa3b7ac7293f616963727_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef610b2e78ffa3b7ac7293f616963727_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef610b2e78ffa3b7ac7293f616963727_JaffaCakes118
-
Size
83KB
-
MD5
ef610b2e78ffa3b7ac7293f616963727
-
SHA1
ede6179040305486d0b87dca0dde9c0848732193
-
SHA256
d23c2f3569bb04881847de7e286e45975706971e123a67d334b09dc754bf6249
-
SHA512
5ecc9c950a7ae42bb3acd79551f54200784cd1875305ead43db3fc96f52a377871e866fa13bb8c13cd06775e08c8f3d6112ca8281cce67cd7180f41284456ad6
-
SSDEEP
1536:FeAZLLL1GXAQ5k7aGSV4bgvGCMU9zkBVitnWyKpWHyN:QQB7eefitnWyKcHyN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef610b2e78ffa3b7ac7293f616963727_JaffaCakes118
Files
-
ef610b2e78ffa3b7ac7293f616963727_JaffaCakes118.exe windows:5 windows x86 arch:x86
19b65035124e5fb920433d9dcef3ed22
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetFolderPathA
shlwapi
StrStrA
StrChrA
kernel32
lstrlenA
lstrcmpA
AllocConsole
GetStdHandle
WriteFile
WriteConsoleA
ReadFile
ReadConsoleA
MultiByteToWideChar
HeapFree
lstrcmpiA
WideCharToMultiByte
HeapAlloc
SetConsoleMode
GetConsoleMode
GetLastError
GetModuleFileNameA
GetTimeFormatA
Sleep
CloseHandle
SizeofResource
LockResource
LoadResource
lstrcpyA
SetFilePointer
CreateFileA
CreateDirectoryA
GetFileAttributesA
GetSystemDefaultLCID
GetModuleHandleA
ReadConsoleInputA
lstrcatA
ExitProcess
WaitForSingleObject
SetConsoleCursorPosition
FillConsoleOutputCharacterA
GetConsoleScreenBufferInfo
PeekNamedPipe
lstrlenW
CreateProcessA
DuplicateHandle
GetCurrentProcess
CreatePipe
GetVersion
GetExitCodeProcess
TerminateProcess
GetTickCount
CreateThread
SetCurrentDirectoryA
DeleteFileA
GetCurrentDirectoryA
FindResourceA
lstrcmpW
GetCommandLineA
GetFileSize
GetProcessHeap
RemoveDirectoryA
lstrcatW
GetTempPathA
user32
GetWindowRect
DialogBoxParamA
CharLowerA
IsCharAlphaNumericA
GetDesktopWindow
GetParent
CharToOemA
MessageBoxA
CopyRect
OffsetRect
SetWindowPos
LoadStringA
SetDlgItemTextA
GetDlgItem
SetFocus
GetDlgItemTextA
EndDialog
wsprintfA
GetForegroundWindow
advapi32
RegQueryValueExA
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExW
ole32
CoUninitialize
CoGetObject
CLSIDFromProgID
CoCreateInstance
CoInitialize
oleaut32
VariantTimeToSystemTime
VarBstrFromCy
VarBstrFromR4
VarBstrFromR8
VarBstrFromDec
SafeArrayUnaccessData
LoadTypeLi
SysFreeString
VariantInit
SysAllocString
DispInvoke
DispGetIDsOfNames
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SysStringLen
SafeArrayAccessData
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ