Static task
static1
Behavioral task
behavioral1
Sample
2c83ca61beeab4697146dd08aff8b028_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2c83ca61beeab4697146dd08aff8b028_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2c83ca61beeab4697146dd08aff8b028_JaffaCakes118
-
Size
814KB
-
MD5
2c83ca61beeab4697146dd08aff8b028
-
SHA1
930460833e13dc2527d9586e3291f58b5336687f
-
SHA256
cfb8b743e2b921dd6d07d1fc26bd6df6e5cb9ea30e693f1884a591f499dfbfaf
-
SHA512
179418d15ee55baffdd22fd333fa14c676ddf929521a0f66862ce1d90fb85c75bc682ad6075b6c220101633997e8a1ee1f3614292a8fe97b13571b78102ebce6
-
SSDEEP
24576:uSPKDxHLAYrxJ7K5UmZdcdb5zvNy1WmZjYWH:usKFLprxVK5zdupAio
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c83ca61beeab4697146dd08aff8b028_JaffaCakes118
Files
-
2c83ca61beeab4697146dd08aff8b028_JaffaCakes118.exe windows:4 windows x86 arch:x86
0b0fca29a4354dff4ef43f5d3e669d19
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
GetEnvironmentVariableA
GetModuleHandleA
DeleteAtom
ReleaseMutex
SetLastError
TlsGetValue
GetCommandLineA
CreateFileA
HeapCreate
CreateMutexA
CloseHandle
ExitThread
FindResourceA
GetACP
GlobalFree
FindClose
PulseEvent
LoadLibraryExW
GlobalUnlock
user32
FillRect
CopyRect
GetIconInfo
GetDC
IsWindow
CheckRadioButton
DefWindowProcW
DrawEdge
SetFocus
CallWindowProcA
DispatchMessageA
GetDlgItem
DrawMenuBar
msasn1
ASN1BERDecNull
ASN1BERDecCheck
ASN1BEREncEoid
ASN1BERDecBool
ASN1BEREncBool
clbcatq
SetupOpen
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ