Static task
static1
Behavioral task
behavioral1
Sample
2bee8fd3fe65a85c47ae6a6cf8a7994c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2bee8fd3fe65a85c47ae6a6cf8a7994c_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2bee8fd3fe65a85c47ae6a6cf8a7994c_JaffaCakes118
-
Size
30KB
-
MD5
2bee8fd3fe65a85c47ae6a6cf8a7994c
-
SHA1
5c1c408879147445384cdcc273a75a7859070d92
-
SHA256
5836c1bade0a2c1ede02f56f9b1fab056c9b676a70a0843512fe80409386a2f7
-
SHA512
16bf1c9e5be3966ade2e841050ee4b638b7f32f07f3cfd7e3520e9e2b50f7ad4f918f19ad793dc64a39f56e2c6b34ad6682ad1054c3db5ece44875636d946b13
-
SSDEEP
384:SGAh7FtVZGc1O31AFuDazkrHyGZE8wPWqXtqkwCbdR:SGAh7TDGc1K1gu+zYHyGZEBWqXjZR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2bee8fd3fe65a85c47ae6a6cf8a7994c_JaffaCakes118
Files
-
2bee8fd3fe65a85c47ae6a6cf8a7994c_JaffaCakes118.exe windows:4 windows x86 arch:x86
e070109474aeeca4d8281492f59c466c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetModuleFileNameA
Sleep
WriteFile
DeleteFileA
LockResource
LoadResource
SizeofResource
FindResourceA
GetModuleHandleA
GetSystemDirectoryA
WaitForSingleObject
SetThreadPriority
ExitProcess
GetCurrentThreadId
TerminateProcess
OpenProcess
CreateEventA
OpenEventA
Process32Next
Process32First
CreateToolhelp32Snapshot
Thread32Next
Thread32First
GetWindowsDirectoryA
CreateFileA
GetFileTime
SetFileTime
GetCurrentProcess
CreateThread
CloseHandle
user32
GetWindow
FindWindowA
SendMessageA
GetWindowTextA
GetClassNameA
PostMessageA
MapVirtualKeyA
GetThreadDesktop
wsprintfA
EnumThreadWindows
advapi32
RegSetValueExA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 153KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ