Static task
static1
Behavioral task
behavioral1
Sample
3eb0203f30656f841a4f5a952841622c_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
3eb0203f30656f841a4f5a952841622c_JaffaCakes118
-
Size
430KB
-
MD5
3eb0203f30656f841a4f5a952841622c
-
SHA1
eb53292401217415ec01071cfe002b76fd9d706d
-
SHA256
bd35beeccacfdbd8f647440d12562fd29dceca33e05f689fa243976f538f8516
-
SHA512
fc9d4734bc04bce99fd487aaf79bf7394ff36ca8b12fb64795e3e09cbcbb07c0460bd49dec476f25febfbc6b22fcac224624b8152d95a09f5be98fd7ee0d24b4
-
SSDEEP
6144:sq+KOX6bfrb744Q7Jk//WTS5lLDxCXj8V5iggR09hIPDnvGvT4ER6fPjI0HKh3sV:y2j/OGvPx+ggy9QevEEoPMh3sdxgYh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3eb0203f30656f841a4f5a952841622c_JaffaCakes118
Files
-
3eb0203f30656f841a4f5a952841622c_JaffaCakes118.exe windows:5 windows x86 arch:x86
05ccb036ee828bffcc9258ab45bc733a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
QueryPerformanceCounter
GetFileTime
FormatMessageW
InterlockedIncrement
LZDone
SetCurrentDirectoryW
GetACP
user32
FindWindowW
GetWindowTextW
PeekMessageW
TranslateMessage
EnableWindow
gdi32
BitBlt
GetDIBits
ResetDCW
PlayEnhMetaFile
DeleteEnhMetaFile
GetEnhMetaFileHeader
GetEnhMetaFileW
EndPage
StartPage
EndDoc
StartDocW
RealizePalette
StretchBlt
SelectPalette
CreateHalftonePalette
GetDIBColorTable
SelectObject
SetBitmapBits
CreateBitmap
CreateCompatibleDC
GetObjectW
DeleteObject
GetDeviceCaps
GetBkColor
msimg32
TransparentBlt
shlwapi
PathAddBackslashW
PathFindExtensionW
PathRemoveFileSpecW
PathCompactPathExW
PathRemoveExtensionW
Sections
.text Size: 244KB - Virtual size: 243KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 177KB - Virtual size: 470KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ