Static task
static1
Behavioral task
behavioral1
Sample
2cc109dbeaa108376f45d3333eb7dedd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2cc109dbeaa108376f45d3333eb7dedd_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2cc109dbeaa108376f45d3333eb7dedd_JaffaCakes118
-
Size
252KB
-
MD5
2cc109dbeaa108376f45d3333eb7dedd
-
SHA1
37540e8fb6f713ff9b697d43a98f8efe6ee34f7a
-
SHA256
ddc8b05b69c20d3af6bb787e8f56359ee453b679360988ac6b04c5b2772ce555
-
SHA512
1f0afccc53c46b4983c1781fd77feffbf62a33cfa5f610d816e830e5ad31738c3a7d179b68d56ea4af5ab28fc9bf6a2e37718f6b5d4ffbb088721bcf29e6a82a
-
SSDEEP
6144:oBo5qpuBj3lu7lQtHdJ95h8xHsT1GegnO58p1nfj4e:6orN1uO9x6YYzpVEe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2cc109dbeaa108376f45d3333eb7dedd_JaffaCakes118
Files
-
2cc109dbeaa108376f45d3333eb7dedd_JaffaCakes118.exe windows:4 windows x86 arch:x86
8704eadad12c69d85be4b80f3c7e7146
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
lstrlenA
GetVersionExA
GetCommandLineA
CreateProcessA
GetWindowsDirectoryA
LeaveCriticalSection
GetTempPathW
GetTickCount
GetDiskFreeSpaceW
GetBinaryTypeA
GlobalUnlock
IsBadStringPtrA
ReadFileScatter
CancelIo
GetModuleHandleA
WriteConsoleOutputCharacterA
VirtualProtect
SuspendThread
ExitProcess
user32
InflateRect
DrawCaption
BeginPaint
CountClipboardFormats
CreateDialogIndirectParamA
SendMessageTimeoutW
ShowWindow
CreateIcon
GetKeyNameTextW
GetForegroundWindow
GetWindow
EqualRect
LoadIconA
SetMenu
GetDlgCtrlID
SetWindowsHookExW
SetUserObjectInformationW
MapVirtualKeyA
PostThreadMessageA
DrawTextW
GetCursor
SetDlgItemInt
LoadKeyboardLayoutW
UnionRect
SetDlgItemTextA
GetProcessDefaultLayout
FindWindowExA
GrayStringW
OemToCharBuffW
LoadStringW
CreateDialogParamW
GetKeyboardLayout
VkKeyScanW
PeekMessageW
GetGuiResources
IsCharLowerA
ClientToScreen
SendNotifyMessageW
DefMDIChildProcW
MenuItemFromPoint
MessageBoxIndirectW
GetMenuItemInfoW
wvsprintfW
HiliteMenuItem
DefFrameProcA
SetWindowsHookExA
GetClipboardSequenceNumber
SwitchDesktop
InternalGetWindowText
GetMenuItemRect
EndMenu
VkKeyScanA
EnumDisplayDevicesA
GetMenu
CreateCursor
SetWindowPos
InvertRect
gdi32
PlayMetaFileRecord
SetColorAdjustment
SetBitmapDimensionEx
GetTextAlign
RemoveFontResourceW
GetEnhMetaFileBits
PolyDraw
SetDIBColorTable
SetSystemPaletteUse
GetEnhMetaFileDescriptionA
EnumFontFamiliesW
CopyEnhMetaFileA
CreateDiscardableBitmap
advapi32
LockServiceDatabase
CreateProcessAsUserW
SetFileSecurityW
DuplicateToken
RegCreateKeyExA
LogonUserW
GetAclInformation
GetSecurityDescriptorDacl
LookupAccountNameW
ClearEventLogW
GetExplicitEntriesFromAclW
OpenEventLogW
CryptSetProvParam
AbortSystemShutdownA
GetSecurityDescriptorGroup
LookupAccountSidW
CloseServiceHandle
ImpersonateLoggedOnUser
GetNamedSecurityInfoA
InitializeAcl
CryptDeriveKey
CryptEncrypt
AddAccessDeniedAce
ObjectCloseAuditAlarmA
QueryServiceConfigA
InitiateSystemShutdownA
NotifyChangeEventLog
SetSecurityDescriptorSacl
CryptSetHashParam
RegSetValueA
CryptSetKeyParam
AdjustTokenPrivileges
shell32
SHGetDesktopFolder
SHGetPathFromIDListA
ole32
CoQueryProxyBlanket
OleBuildVersion
CoInitializeEx
ReadClassStg
OleSetMenuDescriptor
oleaut32
SafeArrayGetLBound
VariantCopy
SafeArrayPutElement
SafeArrayUnaccessData
comctl32
CreatePropertySheetPageA
shlwapi
SHRegOpenUSKeyW
StrDupW
PathIsRootA
PathRemoveFileSpecA
PathIsDirectoryA
StrCpyNW
StrChrIA
PathStripToRootW
StrFormatByteSize64A
StrCmpNIA
PathStripPathW
SHRegWriteUSValueW
PathCombineW
PathIsFileSpecW
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 232KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE