Static task
static1
Behavioral task
behavioral1
Sample
2281c7548909c93dcb7c06969f6f09ff_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2281c7548909c93dcb7c06969f6f09ff_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
2281c7548909c93dcb7c06969f6f09ff_JaffaCakes118
-
Size
80KB
-
MD5
2281c7548909c93dcb7c06969f6f09ff
-
SHA1
b0b941cce59f975d6d7b00af9e378787acac3556
-
SHA256
657b6fb4d2f50f60aba10ddbd5bed05fdafbca6f3ac05985439680dac38c4eff
-
SHA512
a74267f75eb143c347c314f7f89f882d25ebd0ca0878c08588cf582bdcf623dfadac838e4bc3b5275ed95ad37bdffb9fba8b00b4511bf14875a468e3b5c1e18b
-
SSDEEP
1536:Gd2AXk2nh76PLaMO+YMYsiYzpDh2qhBlNb9J3ImF:q2QmzaMisZzpDh2qnfb9uM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2281c7548909c93dcb7c06969f6f09ff_JaffaCakes118
Files
-
2281c7548909c93dcb7c06969f6f09ff_JaffaCakes118.exe windows:4 windows x86 arch:x86
2fb8fdb3ab209c79c8d55c09584260e4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegFlushKey
RegDeleteValueW
RegQueryValueExA
RegLoadKeyA
RegQueryValueExW
RegEnumKeyExA
RegCreateKeyExW
RegEnumValueW
RegEnumKeyExW
RegQueryValueA
RegReplaceKeyA
RegQueryInfoKeyA
RegQueryValueExW
RegFlushKey
RegDeleteKeyW
RegCreateKeyExW
RegEnumValueA
RegEnumValueW
RegEnumKeyW
RegOpenKeyA
RegCreateKeyW
kernel32
DeleteFileA
GetFileSize
SetLastError
CopyFileExA
CopyFileA
OpenFileMappingA
FindFirstFileA
CreateThread
GetFileTime
ExitThread
CreateDirectoryA
OpenFileMappingA
OpenFile
ExitThread
WriteFile
CreateThread
ReadFile
DeleteFileA
CopyFileA
GetComputerNameA
GetConsoleMode
FindFirstFileA
FindAtomA
DeleteFileW
GetFileSize
GetLastError
GlobalFree
CreateDirectoryA
CreateProcessA
GetCPInfo
GetStdHandle
Sleep
OpenFileMappingA
CopyFileW
GetFileTime
CopyFileA
GetCommandLineA
ExitThread
CopyFileExW
DeleteFileA
ReadFile
DeleteFileA
GetCommandLineA
ReadConsoleA
CopyFileExA
CreateThread
GetComputerNameA
CreateProcessA
WriteFile
DeleteAtom
GetLastError
GetStdHandle
FindFirstFileA
Sleep
OpenFileMappingA
DeleteFileW
user32
DrawTextW
InsertMenuA
LoadCursorA
GetDlgItem
GetFocus
CopyIcon
DialogBoxParamA
CalcMenuBar
BlockInput
GetCursor
GetWindowTextLengthA
IsMenu
EndDialog
LoadMenuA
GetDC
DrawIconEx
AppendMenuA
CopyRect
DrawTextA
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.mkdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 4KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ