Static task
static1
Behavioral task
behavioral1
Sample
2c8a12a670ecc69469e04d45477b4d24_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2c8a12a670ecc69469e04d45477b4d24_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2c8a12a670ecc69469e04d45477b4d24_JaffaCakes118
-
Size
6.4MB
-
MD5
2c8a12a670ecc69469e04d45477b4d24
-
SHA1
880bd41c75e9c1e6cb0b8a2373c9a39e58e81897
-
SHA256
7c6c905cbea0388dea3a5f57bfa7c2e1f2fa0db81180d7c7faf0f99b963e8a80
-
SHA512
9b9faa3fbd1b51d959f569e284611eba0cec3bf23503fbc20ba1635c451f6b5a3ac76c7ada1fd62c9ff9ab1fe846acc27b9ca8628b33486abb498ef729a4715e
-
SSDEEP
98304:J8xZKP+UqyQfoeqgDTKPwKw4dtg84EUpD3pqDIJEHaUJWo0wvEQ33cLyBEl6nbgc:KxZmvqyHwa1g2IJE6UL3aOalgbN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c8a12a670ecc69469e04d45477b4d24_JaffaCakes118
Files
-
2c8a12a670ecc69469e04d45477b4d24_JaffaCakes118.exe windows:4 windows x86 arch:x86
cdc00badc7162acde9bb032e793ac137
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
oleaut32
SysFreeString
advapi32
RegQueryValueExA
user32
GetKeyboardType
gdi32
UnrealizeObject
version
VerQueryValueA
ole32
CreateStreamOnHGlobal
comctl32
_TrackMouseEvent
wininet
InternetReadFile
shell32
ShellExecuteA
winmm
PlaySoundW
Sections
ssssssss Size: 528KB - Virtual size: 528KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ffffffff Size: 184KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Katja Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE