Static task
static1
Behavioral task
behavioral1
Sample
e3d729008ed808f563b68f06cfb2c093_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e3d729008ed808f563b68f06cfb2c093_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e3d729008ed808f563b68f06cfb2c093_JaffaCakes118
-
Size
189KB
-
MD5
e3d729008ed808f563b68f06cfb2c093
-
SHA1
f780bc199468766258ff509aa7adb1500912bc7b
-
SHA256
747bd403b404279ad7981079bb1a8dee9e00aefa2e1f623341607d85c43638fd
-
SHA512
720ba86a144028a39306ea1f1800d2d95f82e8273413ea27c8a57fd3f5794fed3469bee399359d7ec21f255445a65a39a76babf9053c8e79df33cc2ad2139560
-
SSDEEP
3072:BE6+FFjTnlUhu0DyQCKEDzvEJ5VPmYSq344mhmtW35EadFDuozOzL:ubB6jyQCK665UYSqIxmqE+FDuoIL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e3d729008ed808f563b68f06cfb2c093_JaffaCakes118
Files
-
e3d729008ed808f563b68f06cfb2c093_JaffaCakes118.exe windows:4 windows x86 arch:x86
a9983d8708e0574848f32fdd80103b01
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
ClipCursor
DestroyCursor
GetSysColorBrush
UnhookWindowsHookEx
RealGetWindowClass
SetWindowPos
IsClipboardFormatAvailable
SetScrollRange
RegisterClassW
EmptyClipboard
SetWindowsHookExW
DrawEdge
CallNextHookEx
ChildWindowFromPoint
DefWindowProcW
ToAscii
DestroyIcon
SetClipboardData
WinHelpW
GetSysColor
rpcrt4
RpcStringBindingComposeA
RpcBindingFromStringBindingA
RpcBindingSetAuthInfoA
NdrClientCall
RpcStringFreeA
kernel32
LocalAlloc
FileTimeToSystemTime
FindResourceExA
CreateFiber
FlushFileBuffers
TerminateProcess
IsDBCSLeadByte
CompareStringW
VerLanguageNameW
GetVolumeInformationW
GetFileType
GetUserDefaultLangID
EnumResourceNamesA
GetSystemTime
GetFileAttributesA
FileTimeToLocalFileTime
FlushFileBuffers
GetProfileStringW
GetVersionExW
UnlockFile
LockFile
GetFileTime
SearchPathW
SetEndOfFile
GetSystemDirectoryW
comdlg32
GetFileTitleA
Sections
.text Size: 167KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ