Static task
static1
Behavioral task
behavioral1
Sample
ef921625a4d4cd2bfd1f3f11d1af6a48_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ef921625a4d4cd2bfd1f3f11d1af6a48_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef921625a4d4cd2bfd1f3f11d1af6a48_JaffaCakes118
-
Size
388KB
-
MD5
ef921625a4d4cd2bfd1f3f11d1af6a48
-
SHA1
3e5da85b458a3baa1e246a16b2ccc9508cea2368
-
SHA256
11deabd19d93abc70c8ca14e71d7f1a6de8a713dd3205ec250070b9318008e49
-
SHA512
8332890e0b67366e7eabbd71d26174400a49133974fd9f0c9a51c248053ecae08d8c3ea3a336e49da9b5054f6751567de7ab722dab8122cfb03f5084ed096066
-
SSDEEP
6144:xU8+jCqrAIIa67eCFEn8SjVZfvlKr2Bb1cQod9a3a2X2Q+8bFsu1mIFO:G8+eq8vaQEn8sVZHNoeaiM8buK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef921625a4d4cd2bfd1f3f11d1af6a48_JaffaCakes118
Files
-
ef921625a4d4cd2bfd1f3f11d1af6a48_JaffaCakes118.exe windows:4 windows x86 arch:x86
b993a5427f1f7f79adec2a67fa597a24
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetCurrentThreadId
ExitProcess
CreateFileA
GetFileType
FindClose
LoadLibraryW
SetEnvironmentVariableA
HeapReAlloc
GetCurrentProcess
WriteFile
InterlockedExchange
FindNextFileW
GetFileAttributesA
GetProcAddress
MultiByteToWideChar
GetCommandLineW
LocalAlloc
GetEnvironmentStrings
GetStartupInfoA
LoadLibraryA
RemoveDirectoryA
FlushFileBuffers
GetTickCount
LCMapStringA
GetOEMCP
GlobalFree
GetModuleFileNameW
lstrlenA
GetConsoleOutputCP
EnterCriticalSection
GetStdHandle
HeapFree
GetModuleHandleA
GetCommandLineA
GetVersion
TerminateProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetLastError
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
HeapAlloc
GetStringTypeA
GetStringTypeW
LCMapStringW
user32
DestroyWindow
GetFocus
LoadCursorA
SendMessageA
ScreenToClient
GetDlgItem
ShowWindow
UnregisterClassA
EnableMenuItem
GetDC
InvalidateRect
TranslateMessage
IsWindow
PostQuitMessage
EndDialog
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 360KB - Virtual size: 359KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE