Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ea6b8a444ac84e9af4e879ce16c37ff2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ea6b8a444ac84e9af4e879ce16c37ff2.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_ea6b8a444ac84e9af4e879ce16c37ff2
-
Size
14.7MB
-
MD5
ea6b8a444ac84e9af4e879ce16c37ff2
-
SHA1
8aa368fbb8702c4e23e0ea8066efb4b4f6ab93c0
-
SHA256
25b5562d7367c5d6b3ba1e972f7dc163d8a420f828f517f6f7d12eb0ba503605
-
SHA512
dff566b5e453b332388c0657de12cec1d0da88dd48542825e8bb3ee340176b91bc662451a622349e16d1b20f0eb1b23d7681185d9e6556e790f5b6c975d1fd48
-
SSDEEP
12288:iz+wSUpBMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMU:iz8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_ea6b8a444ac84e9af4e879ce16c37ff2
Files
-
JaffaCakes118_ea6b8a444ac84e9af4e879ce16c37ff2.exe windows:5 windows x86 arch:x86
45b3bc45f71f6d9e40582b43454bd6fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentVariableA
TlsGetValue
VirtualAlloc
DeleteFileW
GetModuleHandleW
CreateEventA
SetSystemTime
GetCurrentDirectoryA
CreateMailslotA
LoadLibraryA
SleepEx
GetCurrentThread
OpenJobObjectA
GetShortPathNameA
MoveFileExW
WaitForSingleObject
OpenEventW
TerminateProcess
CreateFileA
RemoveDirectoryW
comsvcs
RecycleSurrogate
SafeRef
CoCreateActivity
ctl3d32
Ctl3dEnabled
Ctl3dCtlColor
Ctl3dUnregister
Ctl3dGetVer
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
udata Size: 1024B - Virtual size: 704B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ldata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_MEM_READ
.relc Size: 14.6MB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE