Static task
static1
Behavioral task
behavioral1
Sample
2c129141f1fa1d572f4914f4ef1a2bea_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2c129141f1fa1d572f4914f4ef1a2bea_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2c129141f1fa1d572f4914f4ef1a2bea_JaffaCakes118
-
Size
51KB
-
MD5
2c129141f1fa1d572f4914f4ef1a2bea
-
SHA1
a3c0ba2030b5a4c9d6825b14f1fa42fadca1b4da
-
SHA256
667b751d103ec7864ce165da9a8bc497bd80de8739f58fa1ebfc8d04c5dc1be6
-
SHA512
4624ad851e914bd15882f3d8ac7a150636467173204fd55c599ec5ed0b75da05ebc1195f15e4a4087497a8ba3d4781a707ac9895cef08a477d9fd2f2c4c5fecf
-
SSDEEP
768:+QxW6MOS++yHO7smRl507EjvAQqTF4At1mpTCjrJQAskqhbuw0dcQd77esplmi:+QxW6TYyuwoBAFVmpCyAskqaOQd7x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c129141f1fa1d572f4914f4ef1a2bea_JaffaCakes118
Files
-
2c129141f1fa1d572f4914f4ef1a2bea_JaffaCakes118.exe windows:5 windows x86 arch:x86
c4998cfbf53f1a69af949754dd445b18
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CheckDlgButton
TranslateMessage
GetMessageA
UpdateWindow
ShowWindow
SetWindowTextA
GetWindowLongA
GetClipboardViewer
EnableWindow
BeginPaint
WindowFromDC
DispatchMessageA
EndPaint
GetDlgCtrlID
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
gdi32
GetStockObject
CreateEllipticRgn
DeleteObject
CreatePatternBrush
SetMapMode
CreatePen
shlwapi
StrIsIntlEqualW
ole32
CoCopyProxy
CoGetCurrentProcess
CoGetMalloc
GetRunningObjectTable
oleaut32
VarDateFromDec
kernel32
DeleteCriticalSection
HeapDestroy
GetEnvironmentStrings
GetStartupInfoA
LeaveCriticalSection
HeapFree
GetACP
QueryPerformanceFrequency
GetModuleHandleA
SetFileAttributesA
EnterCriticalSection
InitializeCriticalSection
GetLastError
HeapAlloc
HeapCreate
InterlockedExchange
Sections
.text Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 784B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE