Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ecccec8156acd94be5aa4a34bcc5899c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ecccec8156acd94be5aa4a34bcc5899c.exe
Resource
win10v2004-20250207-en
General
-
Target
JaffaCakes118_ecccec8156acd94be5aa4a34bcc5899c
-
Size
260KB
-
MD5
ecccec8156acd94be5aa4a34bcc5899c
-
SHA1
b6553b45a2a440b2b52fc4804dac8b81a9c1dfe6
-
SHA256
d35024030fbc8fdaa475a4524449948f8c39a0fcd7d081c7a0fb2fd8f0ee8b02
-
SHA512
c730029ca7b7eaff109d2f9f67fe894dbc7421489295ecdb76ce3a562e3f0442b84941ec2955609380834d0a5de566c65f47019914c9148a8f1e021730c5dda6
-
SSDEEP
6144:uJGfOvTmUwYOLYAldVwxSd+LCWmNibWgW3I:u4foUYfAldVwx5LFmIhW4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_ecccec8156acd94be5aa4a34bcc5899c
Files
-
JaffaCakes118_ecccec8156acd94be5aa4a34bcc5899c.exe windows:4 windows x86 arch:x86
44ff48658e712eb7e94653b8438446d7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryW
GetFileAttributesW
GetModuleFileNameW
GetTempPathW
GetLastError
LocalAlloc
GetCurrentThread
OpenEventW
GetWindowsDirectoryW
LocalFree
lstrcpynW
WaitForSingleObject
SetEvent
InitializeCriticalSection
Sleep
CreateEventW
FreeLibrary
SetErrorMode
LoadLibraryW
CreateDirectoryW
GetCurrentProcess
lstrlenW
MultiByteToWideChar
lstrlenA
GetExitCodeProcess
MoveFileW
CreateMutexW
ExpandEnvironmentStringsW
ExpandEnvironmentStringsA
LoadLibraryA
RemoveDirectoryW
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
Beep
GetVersionExW
GetModuleHandleW
BeginUpdateResourceW
GetProcAddress
user32
GetForegroundWindow
MoveWindow
IsWindow
GetTopWindow
MessageBeep
PostMessageW
OffsetRect
RegisterWindowMessageW
InvalidateRect
DestroyIcon
SetWindowPos
SendMessageW
EnableWindow
gdi32
CreateFontIndirectW
CreateFontW
DeleteObject
CreatePatternBrush
CreateSolidBrush
advapi32
FreeSid
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyExW
OpenServiceW
QueryServiceStatus
OpenSCManagerW
CloseServiceHandle
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
GetUserNameW
GetLengthSid
IsValidSecurityDescriptor
RevertToSelf
AddAccessAllowedAce
SetSecurityDescriptorOwner
AllocateAndInitializeSid
OpenProcessToken
OpenThreadToken
SetSecurityDescriptorGroup
AccessCheck
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
ImpersonateSelf
InitializeAcl
shell32
SHGetSpecialFolderLocation
ShellExecuteW
SHBrowseForFolderW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
ole32
CoCreateInstance
mapistub
MAPIInitialize
DllGetClassObject
OpenStreamOnFile
cmc_read
BMAPISendMail
cmc_logoff
BMAPIFindNext
MAPIOpenLocalFormContainer
kbdcz1
KbdLayerDescriptor
Sections
.edata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 4KB - Virtual size: 466KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 99KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 1KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 317KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 120KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ