Static task
static1
Behavioral task
behavioral1
Sample
efd160c6eb3a9dbbabf8d7c3321c8518_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
efd160c6eb3a9dbbabf8d7c3321c8518_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
efd160c6eb3a9dbbabf8d7c3321c8518_JaffaCakes118
-
Size
5.5MB
-
MD5
efd160c6eb3a9dbbabf8d7c3321c8518
-
SHA1
3db86cb6c900c1eb1bfa06a2db4ae13b247157c8
-
SHA256
5cb64dc728fd6df8957366c60bac3e9b1e186e8bd929d3a956f060d26ef2ce70
-
SHA512
1dc96b6c260520f8279a757cc5a9fb35c2bbd8c8961947badf19a844037b5c5133d169d67a5a89aa68d80cac1cae6452467dda89796ac5550fbbf2f647ae9dbf
-
SSDEEP
24576:j5zjnWs+S+er0fMtc3Xeg81AEuU9ZSusjMHv9OiPtsIOfUKIAeE6All8ndyDg:/seQ81dR/2lKd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource efd160c6eb3a9dbbabf8d7c3321c8518_JaffaCakes118
Files
-
efd160c6eb3a9dbbabf8d7c3321c8518_JaffaCakes118.exe windows:5 windows x86 arch:x86
d559c90ddb071c9e3cdc24a1bf16c6b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalLock
GlobalUnlock
LocalAlloc
VirtualAllocEx
HeapAlloc
HeapFree
GetLastError
CloseHandle
CreateFileW
IsValidCodePage
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetCommandLineW
IsProcessorFeaturePresent
SetLastError
GetCurrentThread
GetCurrentThreadId
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetModuleHandleW
CreateSemaphoreW
EnterCriticalSection
LeaveCriticalSection
IsDebuggerPresent
GetACP
GetOEMCP
GetCPInfo
FreeLibrary
LoadLibraryExW
OutputDebugStringW
HeapReAlloc
GetStringTypeW
HeapSize
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
DuplicateHandle
WaitForSingleObject
GetExitCodeThread
CreateThread
ExitThread
CreateTimerQueue
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
ReleaseSemaphore
LoadLibraryW
user32
GetMenuItemInfoW
GetSubMenu
ShowOwnedPopups
DestroyWindow
PeekMessageW
GetClassNameW
Sections
.text Size: 188KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rle6r Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.e4ee Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ