Static task
static1
Behavioral task
behavioral1
Sample
2c131c3890fc80a4393b24a2fe263bda_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2c131c3890fc80a4393b24a2fe263bda_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2c131c3890fc80a4393b24a2fe263bda_JaffaCakes118
-
Size
409KB
-
MD5
2c131c3890fc80a4393b24a2fe263bda
-
SHA1
2f35ad1182c5b910ac49f257c24ad02a54e33331
-
SHA256
829a189621560221289f13d446c7d55422d44666edfeb4165a8950d7ebb3199d
-
SHA512
952a9696399e8e2af92a815f18ab4ea2a80f2c692eade5c709b1a11743d93536c736bd83f4d3fb4029ef1741b2e440f259aaaae59d0ef827ce19671623f44a0b
-
SSDEEP
12288:tGqkvS6RbnvWgeFd9V0R2febbKcbo94K3+xaAU7:0qo49eR7bjbovKA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c131c3890fc80a4393b24a2fe263bda_JaffaCakes118
Files
-
2c131c3890fc80a4393b24a2fe263bda_JaffaCakes118.exe windows:4 windows x86 arch:x86
c57983380a75acb1594b746b69e16f1d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSaveKeyA
RegSetValueA
CryptHashSessionKey
CryptDeriveKey
gdi32
DescribePixelFormat
TextOutW
SetLayout
RemoveFontResourceA
GdiPlayJournal
WidenPath
CreateICA
SetFontEnumeration
shell32
SHFormatDrive
DragQueryFileW
ShellExecuteExA
SHGetDataFromIDListA
RealShellExecuteW
RealShellExecuteExW
SHGetInstanceExplorer
ExtractAssociatedIconExA
SHQueryRecycleBinW
user32
ScrollWindowEx
GetParent
InflateRect
CreateMDIWindowA
WinHelpA
ArrangeIconicWindows
DestroyCaret
GetKeyboardLayoutNameW
EnableScrollBar
IsMenu
EqualRect
EndDeferWindowPos
DefDlgProcW
DrawEdge
CharToOemW
InvalidateRect
SetFocus
kernel32
GlobalGetAtomNameW
WriteFile
GetStartupInfoA
IsValidLocale
GetOEMCP
GetEnvironmentStringsW
LCMapStringA
LCMapStringW
IsDebuggerPresent
WideCharToMultiByte
GetVersionExA
CreateFileMappingA
GetTimeFormatA
GetSystemTimeAsFileTime
GetCommandLineA
VirtualAlloc
DeleteCriticalSection
TerminateProcess
GetCommandLineW
GetCPInfo
InterlockedIncrement
TlsAlloc
GetStartupInfoW
HeapDestroy
TlsSetValue
TlsFree
ExitProcess
GetProcAddress
FreeEnvironmentStringsW
EnumCalendarInfoExA
GetStringTypeW
VirtualQuery
LeaveCriticalSection
SetLastError
GetLocaleInfoA
LoadLibraryA
RtlUnwind
CompareStringW
UnhandledExceptionFilter
GlobalDeleteAtom
VirtualFree
GetTempFileNameW
GetStringTypeA
GetModuleFileNameA
GetModuleFileNameW
GetCurrentThread
SetEnvironmentVariableA
GetDateFormatA
GetTimeZoneInformation
WritePrivateProfileSectionW
HeapSize
SetUnhandledExceptionFilter
CompareStringA
GetCurrentProcessId
SetStdHandle
QueryPerformanceCounter
SetHandleCount
EnumSystemLocalesA
FreeLibrary
InterlockedDecrement
FreeEnvironmentStringsA
EnterCriticalSection
GetLocaleInfoW
IsValidCodePage
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
TlsGetValue
MultiByteToWideChar
GetCurrentProcess
GetFileType
GetSystemTimeAdjustment
HeapCreate
InitializeCriticalSection
GetLastError
InterlockedExchange
SetConsoleCtrlHandler
GetModuleHandleA
GetTickCount
Sleep
GetStdHandle
GetACP
GetCurrentThreadId
GetEnvironmentStrings
GetUserDefaultLCID
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 278KB - Virtual size: 298KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ