Static task
static1
Behavioral task
behavioral1
Sample
2fe56ab0fe7df63ac7552d6c6d855ccd_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2fe56ab0fe7df63ac7552d6c6d855ccd_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
2fe56ab0fe7df63ac7552d6c6d855ccd_JaffaCakes118
-
Size
96KB
-
MD5
2fe56ab0fe7df63ac7552d6c6d855ccd
-
SHA1
04d4905bdb06a0ff1ffca4c6505fecfffb14572c
-
SHA256
7b4ad131d2fe17b752b5c49ab9a4876ad7db200832c07cdd68ff304ee7808b64
-
SHA512
909a0540ec848656d4d71b1b4820a0a39a780e1430f10e02cb87335237d0fa86e2b4669c23f8cd02220d24388bb48ebec3618ae2b18a365afa3b506f4213a205
-
SSDEEP
1536:/EJzMlCqnStxbcAZt8b/DxnYRMerE7gXXpkysK4BsWeCC6hRekCzhn09iFpF4o:/EJzMlC8StxbcA0b/DVCHrWaWysK4Ghr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2fe56ab0fe7df63ac7552d6c6d855ccd_JaffaCakes118
Files
-
2fe56ab0fe7df63ac7552d6c6d855ccd_JaffaCakes118.exe windows:4 windows x86 arch:x86
edbcb35b8fff87ab1609fb1d0615a553
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetTextAlign
GetEnhMetaFileBits
Pie
CreateEllipticRgn
SetPixel
CreateDIBPatternBrushPt
OffsetRgn
Rectangle
ScaleWindowExtEx
GetObjectType
OffsetClipRgn
SetTextColor
SetMapMode
DeleteEnhMetaFile
ExtSelectClipRgn
FillRgn
GetGlyphOutlineW
GetClipBox
PolyBezierTo
CreateDCW
StretchBlt
RectVisible
SetWindowExtEx
SetBkMode
CreatePen
StrokePath
GetDeviceCaps
TextOutA
SetBkColor
DPtoLP
SetAbortProc
GetTextColor
SetPolyFillMode
CreatePenIndirect
SetRectRgn
SetViewportExtEx
Ellipse
DeleteObject
CreateDIBSection
SetTextCharacterExtra
CreateSolidBrush
SetStretchBltMode
CombineRgn
CopyEnhMetaFileW
EndPage
GetEnhMetaFileHeader
CloseEnhMetaFile
ExtCreatePen
GetCharWidthA
SetPixelV
GetSystemPaletteEntries
GetTextExtentPoint32W
EnumFontFamiliesExW
GetBitmapBits
GetObjectW
SelectPalette
SetWorldTransform
GetEnhMetaFilePaletteEntries
CreateDCA
GetClipRgn
ExtCreateRegion
ScaleViewportExtEx
PatBlt
RestoreDC
EndDoc
StartDocA
Polyline
CreateBitmap
GetTextExtentPoint32A
SaveDC
GetRgnBox
DeleteDC
advapi32
RegQueryValueW
SetSecurityDescriptorOwner
RegRestoreKeyW
StartServiceCtrlDispatcherW
AddAce
ChangeServiceConfigW
RevertToSelf
QueryServiceConfigW
InitializeSid
RegOpenKeyExA
DeleteService
GetSidIdentifierAuthority
RegSetValueExW
AllocateAndInitializeSid
QueryServiceStatus
RegCreateKeyW
LookupAccountNameW
InitiateSystemShutdownA
RegDeleteKeyA
CreateProcessAsUserW
RegEnumKeyW
CreateServiceW
SetFileSecurityA
GetKernelObjectSecurity
RegConnectRegistryA
RegisterEventSourceA
kernel32
GetUserDefaultLangID
GetDriveTypeW
GetSystemDirectoryW
GetNumberFormatA
CancelIo
LZCopy
GlobalAddAtomW
urlmon
CreateURLMoniker
IsAsyncMoniker
RegisterFormatEnumerator
URLDownloadToCacheFileW
RevokeBindStatusCallback
CoInternetCreateZoneManager
HlinkSimpleNavigateToString
FindMimeFromData
CreateAsyncBindCtx
SetSoftwareUpdateAdvertisementState
RegisterBindStatusCallback
RegisterMediaTypes
HlinkNavigateMoniker
CopyBindInfo
URLOpenBlockingStreamA
CreateFormatEnumerator
URLDownloadToCacheFileA
GetClassURL
ReleaseBindInfo
UrlMkGetSessionOption
ObtainUserAgentString
URLOpenPullStreamW
HlinkGoForward
UrlMkSetSessionOption
MkParseDisplayNameEx
Sections
.text Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ