Static task
static1
Behavioral task
behavioral1
Sample
ecb4cd4c703777c1723f356b55a5684f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ecb4cd4c703777c1723f356b55a5684f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ecb4cd4c703777c1723f356b55a5684f_JaffaCakes118
-
Size
183KB
-
MD5
ecb4cd4c703777c1723f356b55a5684f
-
SHA1
a96f93f51e62ba65232f6e616b0d483e63ce3cb8
-
SHA256
624bb3c5b685ebbab1a0c687b742cd798a681b2a1361ea23266cf0605b596101
-
SHA512
48878cc22d65933917f07e9f63e7c2718ac6da3282fcfbd727dadaf78be94dbef963c28f8fa392e11d106b4d561297eef2ee33a72a62401555781f66e8eb11ea
-
SSDEEP
3072:Iu95IaH1zODs+0V/ZpAFgRpPEIZx0kI1FwofOrUDflMiGZm3fZB:IuAG1zxdVxpR+X1Fwofu+Mium3f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ecb4cd4c703777c1723f356b55a5684f_JaffaCakes118
Files
-
ecb4cd4c703777c1723f356b55a5684f_JaffaCakes118.exe windows:4 windows x86 arch:x86
35e9f212ab1eaa3f3bf3894b5c8a9bf9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
rpcrt4
RpcStringBindingComposeA
RpcBindingSetAuthInfoA
RpcBindingFromStringBindingA
NdrClientCall
RpcStringFreeA
comctl32
ImageList_DrawEx
ImageList_Add
ImageList_Create
ImageList_GetIconSize
ImageList_Destroy
user32
ChildWindowFromPoint
CallNextHookEx
ToAscii
DestroyIcon
DestroyCursor
SetClipboardData
SetWindowsHookExW
DrawEdge
EmptyClipboard
RealGetWindowClass
IsClipboardFormatAvailable
GetSysColorBrush
RegisterClassW
SetScrollRange
WinHelpW
DefWindowProcW
SetWindowPos
ClipCursor
UnhookWindowsHookEx
GetSysColor
comdlg32
GetFileTitleA
kernel32
SearchPathW
FindResourceExA
CreateFiber
GetFileAttributesA
FileTimeToSystemTime
LocalAlloc
CompareStringW
GetProfileStringW
TerminateProcess
GetVersionExW
SetEndOfFile
EnumResourceNamesA
FileTimeToLocalFileTime
GetVolumeInformationW
IsDBCSLeadByte
VerLanguageNameW
FlushFileBuffers
GetUserDefaultLangID
GetSystemTime
FlushFileBuffers
UnlockFile
GetFileType
GetFileTime
LockFile
GetSystemDirectoryW
Sections
.text Size: 157KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ