Static task
static1
Behavioral task
behavioral1
Sample
0e02f5d685647356641a3255330890f7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e02f5d685647356641a3255330890f7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0e02f5d685647356641a3255330890f7_JaffaCakes118
-
Size
224KB
-
MD5
0e02f5d685647356641a3255330890f7
-
SHA1
d6eef4cee7196253e147a2ab01af7bfe8ccb1eb6
-
SHA256
ec0d17640e891e8e99db1169ff65d9ec825671680d1b70e22f056964d7dca930
-
SHA512
0e8e25ce4f46ef3d6a5622436385be3b78c1a3ae48dee66124748bc6cf60f08b6a0fbe47f6186eb683adb580ff6a72e6a27562a0937f726ef20a319af1798b5a
-
SSDEEP
1536:3HNMSJLugQizHysn+y59TmKvkr0eibaBZLiyUzlSsG2l2ZNBK+ulrt/:XiSEgQiz7nNUPrusDz+b/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e02f5d685647356641a3255330890f7_JaffaCakes118
Files
-
0e02f5d685647356641a3255330890f7_JaffaCakes118.exe windows:4 windows x86 arch:x86
ba992807d297f2a8ebd3d776d6fff798
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
wsprintfA
ReleaseDC
OemToCharA
GetSystemMetrics
GetDC
FindWindowA
kernel32
lstrcpyW
lstrlenW
lstrlenA
lstrcpynA
CloseHandle
CopyFileA
CreateDirectoryA
CreateFileA
CreateFileMappingA
CreateMutexA
CreateProcessA
DeleteFileA
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FreeLibrary
FreeResource
GetComputerNameA
GetComputerNameW
GetDiskFreeSpaceExA
GetDriveTypeA
GetEnvironmentVariableA
GetFileAttributesA
GetFileSize
GetLastError
GetLocalTime
GetLocaleInfoA
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetSystemDefaultLangID
GetSystemDirectoryA
GetSystemInfo
GetTempPathA
GetTickCount
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalMemoryStatusEx
HeapAlloc
HeapFree
LoadLibraryA
LoadResource
LockResource
MapViewOfFile
MoveFileExA
MultiByteToWideChar
OpenProcess
ReadFile
RtlMoveMemory
RtlZeroMemory
SetCurrentDirectoryA
SetEndOfFile
SetFileAttributesA
SetFilePointer
SizeofResource
Sleep
UnmapViewOfFile
VerLanguageNameA
VirtualAlloc
VirtualFree
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcatA
lstrcatW
lstrcmpA
lstrcmpiA
lstrcpyA
gdi32
GetDeviceCaps
Sections
.text Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 262KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE