Static task
static1
Behavioral task
behavioral1
Sample
2c71a02743b9ef241f19abc579d564a5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2c71a02743b9ef241f19abc579d564a5_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2c71a02743b9ef241f19abc579d564a5_JaffaCakes118
-
Size
128KB
-
MD5
2c71a02743b9ef241f19abc579d564a5
-
SHA1
615d4a6c41e8d2e13ed04d495e082ca310de3961
-
SHA256
e8b234af26af2d45c8234217c3f99a310a9301f64542b83ca014f64e0016b3f2
-
SHA512
1f7625c9cc5b0dfa60f357cba7714cff8423d88f107956bd4bcc12278c918ed7a7d932757450e44da11c7c8829c60f900b7290a0d3d668151865b27d9a60390a
-
SSDEEP
3072:k4Mjo5dq8M3WSnJi9EUeRKm78QOvamymMJh:krjodmWSJAE/0mJmymIh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c71a02743b9ef241f19abc579d564a5_JaffaCakes118
Files
-
2c71a02743b9ef241f19abc579d564a5_JaffaCakes118.exe windows:1 windows x86 arch:x86
2769117e90ad85d2a8f9f5e57c3c8510
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_XcptFilter
_acmdln
__setusermatherr
_controlfp
__p__commode
__p__fmode
__set_app_type
_except_handler3
__getmainargs
_initterm
memcpy
exit
_exit
_adjust_fdiv
gdi32
RestoreDC
GetStockObject
SetBkMode
kernel32
VirtualProtect
GetModuleHandleA
GetStartupInfoA
VirtualAlloc
VirtualFree
user32
IsZoomed
GetWindowThreadProcessId
InvalidateRgn
IsDlgButtonChecked
DrawMenuBar
SetClassLongA
LoadAcceleratorsA
wsprintfA
LoadMenuA
GetDoubleClickTime
RegisterWindowMessageA
CreateWindowExA
IntersectRect
FindWindowA
SetClipboardData
LoadCursorA
Sections
.text Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ