Static task
static1
Behavioral task
behavioral1
Sample
2def36aeb1406bb117821d1a3f601434_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2def36aeb1406bb117821d1a3f601434_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2def36aeb1406bb117821d1a3f601434_JaffaCakes118
-
Size
815KB
-
MD5
2def36aeb1406bb117821d1a3f601434
-
SHA1
e74c653d6867f145a1d10f0486ec4f83a9982e2b
-
SHA256
fbb20214e6daac1865e2dc7fd245f959c5b6d91ff393f52c064ed7fd5b264671
-
SHA512
f842076d96fda83edafd6f6a3e421787067b9ec890a655aeaaaf8f87c3017d1c35182188c83481a3f0d403eb2c97b2eff603efbeb7b8720343da927a36d6d0d5
-
SSDEEP
24576:JXqcxMRkpBAWQX/dtQUdJJ/zOPL/s0z2YUxx:ZLMRGKTv0GBOjs06Yu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2def36aeb1406bb117821d1a3f601434_JaffaCakes118
Files
-
2def36aeb1406bb117821d1a3f601434_JaffaCakes118.exe windows:4 windows x86 arch:x86
7d5ac8c9df7b3f2bc15085584902c035
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
TlsGetValue
SetLastError
ExitProcess
FindAtomA
lstrlenA
FreeEnvironmentStringsA
CreateFileA
LoadLibraryExW
GetModuleHandleA
GetLastError
UnmapViewOfFile
GlobalUnlock
HeapDestroy
FindClose
SetupComm
CreateMutexA
HeapCreate
MapViewOfFile
LocalFree
user32
GetDlgItem
GetDC
DrawEdge
DrawMenuBar
IsWindow
CallWindowProcA
DispatchMessageA
DefWindowProcW
CopyRect
CheckRadioButton
FillRect
GetIconInfo
GetFocus
MessageBoxA
uxtheme
GetThemeRect
GetThemeSysInt
DrawThemeIcon
DrawThemeText
DrawThemeEdge
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ