Static task
static1
Behavioral task
behavioral1
Sample
2c5e24d4eb676a340555adc378d57c3f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2c5e24d4eb676a340555adc378d57c3f_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2c5e24d4eb676a340555adc378d57c3f_JaffaCakes118
-
Size
320KB
-
MD5
2c5e24d4eb676a340555adc378d57c3f
-
SHA1
b1d684bf0e5fcbcbf6ddbe3f2ac0b3b775e256e9
-
SHA256
ada2f32709644c9cd62fabb8873eaa96d5dedf65403454ed0bddbe86b1ad08f1
-
SHA512
22bea24293f606ed3ff5bac29c07ddd0123edba658f7ad5b11a2a67c62ea158b99adc95aa95d2e4c9f56ff51fd7875dfd97d913ac4cb23983bc744208c3b76a9
-
SSDEEP
6144:yoQca1WKNfhFhhyDkCyj/tmAmACrPPgNsn6+38r:fhagKNfXqkFEljPguD+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c5e24d4eb676a340555adc378d57c3f_JaffaCakes118
Files
-
2c5e24d4eb676a340555adc378d57c3f_JaffaCakes118.exe windows:4 windows x86 arch:x86
63e74ff07740d40278ff566e879cfa3a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommState
GetLocaleInfoW
PulseEvent
FindFirstFileA
GlobalUnlock
SetConsoleTitleA
SetHandleCount
GetVolumeInformationW
GetPrivateProfileSectionW
ReadFileScatter
DebugBreak
FreeLibraryAndExitThread
QueryDosDeviceW
EraseTape
lstrcmpiW
GenerateConsoleCtrlEvent
GetUserDefaultLangID
SetCommMask
_llseek
SetEvent
OutputDebugStringW
GetWindowsDirectoryA
GetTempFileNameA
SetupComm
SystemTimeToFileTime
GetSystemTimeAdjustment
GetPrivateProfileStringA
CreateWaitableTimerA
FatalAppExitA
SetCommTimeouts
SetConsoleMode
GetSystemDefaultLangID
DuplicateHandle
SearchPathW
GetComputerNameW
GetTapeParameters
GetAtomNameA
LoadLibraryExA
EnumResourceNamesA
IsBadStringPtrA
FindResourceExW
TryEnterCriticalSection
MoveFileExA
GlobalFindAtomW
CreateNamedPipeW
UnmapViewOfFile
GetSystemTime
CreateProcessA
VirtualQueryEx
GlobalReAlloc
WriteProcessMemory
EnumResourceNamesW
GetOverlappedResult
SuspendThread
GetConsoleCursorInfo
CloseHandle
GetProfileStringA
GetCPInfo
VirtualProtect
ConnectNamedPipe
GetCurrentProcess
GetConsoleMode
GetBinaryTypeA
GetLogicalDriveStringsA
SetProcessAffinityMask
LocalFileTimeToFileTime
GetThreadContext
FlushConsoleInputBuffer
GetCompressedFileSizeW
PrepareTape
SetThreadAffinityMask
FindNextChangeNotification
FormatMessageW
LocalSize
FlushFileBuffers
GetCommandLineW
GetFileAttributesExA
InitializeCriticalSection
RemoveDirectoryW
GetDateFormatA
RaiseException
GetBinaryTypeW
GlobalFlags
CreateDirectoryW
TlsGetValue
GetCommModemStatus
GetDriveTypeW
LoadLibraryExW
ReadFile
GetStartupInfoA
LeaveCriticalSection
GetFileInformationByHandle
GetVersionExA
GetCommandLineA
lstrlenA
CreateIoCompletionPort
ExitProcess
user32
GetDlgCtrlID
SetPropA
ScrollDC
GetAsyncKeyState
SwapMouseButton
FillRect
GetWindow
SetWindowLongA
ScrollWindowEx
CountClipboardFormats
MoveWindow
ModifyMenuW
DrawFrameControl
SetProcessDefaultLayout
GetClassNameA
MonitorFromPoint
MsgWaitForMultipleObjectsEx
GetGuiResources
DialogBoxParamA
GetWindowLongW
LoadKeyboardLayoutW
GetDoubleClickTime
LoadImageW
IsWindow
DrawCaption
EqualRect
IsCharUpperW
CopyRect
SystemParametersInfoA
DispatchMessageA
SetMenuItemInfoA
CharLowerBuffW
DefDlgProcW
MonitorFromRect
FrameRect
LoadBitmapA
GetCaretPos
gdi32
CreateBrushIndirect
PolyBezierTo
CreatePolyPolygonRgn
SetROP2
GetCharWidthA
SetTextJustification
shell32
SHFileOperationW
ole32
ReadClassStg
CoCreateInstance
CoImpersonateClient
CoFileTimeNow
CoInitializeEx
ProgIDFromCLSID
OleInitialize
oleaut32
SafeArrayCreate
SetErrorInfo
shlwapi
StrCmpNIA
setupapi
SetupFindFirstLineW
SetupOpenInfFileW
SetupInitDefaultQueueCallback
SetupDiEnumDriverInfoA
SetupDiClassNameFromGuidExA
Sections
.text Size: 280KB - Virtual size: 279KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE