Static task
static1
Behavioral task
behavioral1
Sample
2b20904ce00747c55419cc1f04adf55f_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2b20904ce00747c55419cc1f04adf55f_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2b20904ce00747c55419cc1f04adf55f_JaffaCakes118
-
Size
48KB
-
MD5
2b20904ce00747c55419cc1f04adf55f
-
SHA1
54255b1f10eeddfe368cac3532090cb22870b073
-
SHA256
459e6c3618c6476f924d6667cedcb951c1c846366a9be2eed78399de2d1fff84
-
SHA512
5f9995f5e3bfbc06984f6c889eb8b53aa83898cb76b89d0dfc27178fa12e502bef94e35145ba30d058dcfa35c16b5fc9ec2496066226834bc400da152ae6a0ec
-
SSDEEP
384:wM5dxk42zPCB8g8hx1Vyt8pyEd0rF6oZ1BEHF1wqwkF5b/NvwB90g60BagOYVfbB:wCe4oKaKgdd6F6oTiH/wqwkb/Nvm6f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b20904ce00747c55419cc1f04adf55f_JaffaCakes118
Files
-
2b20904ce00747c55419cc1f04adf55f_JaffaCakes118.exe windows:4 windows x86 arch:x86
d08fddbf6fbdc8bdc75cd13153cb92c0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EndDialog
DefWindowProcA
DestroyWindow
DialogBoxParamA
BeginPaint
GetClientRect
DrawTextA
EndPaint
PostQuitMessage
CreateWindowExA
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
kernel32
GetEnvironmentStrings
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
GetProcAddress
HeapReAlloc
VirtualAlloc
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
WriteFile
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 712B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ