Static task
static1
Behavioral task
behavioral1
Sample
2ce1ecbb82eeeae247b1c9e29c6d8076_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2ce1ecbb82eeeae247b1c9e29c6d8076_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2ce1ecbb82eeeae247b1c9e29c6d8076_JaffaCakes118
-
Size
2.0MB
-
MD5
2ce1ecbb82eeeae247b1c9e29c6d8076
-
SHA1
4807444280ac58908324fafaa5489fb18637b6f4
-
SHA256
b755aebadd46e6e3548b43948e394b297ff511e9765225a464e79b2f0c15c6ad
-
SHA512
098807aa70cc15c58da93e2c549c160920d7554396146a0123d7b0b727ac404b469fca45bff3cca0557ab74ecbe78086439330efeece001574d2c3d414a42952
-
SSDEEP
49152:07IXUf3Zq5HtoMt8fuyIvm/JJaM8RuJHwbotx:LU3ZqJSA8fuy/xEM8RUwbK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ce1ecbb82eeeae247b1c9e29c6d8076_JaffaCakes118
Files
-
2ce1ecbb82eeeae247b1c9e29c6d8076_JaffaCakes118.exe windows:4 windows x86 arch:x86
3be29c32da307184f6744a4e42dbde1f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetClipboardSequenceNumber
RegisterClassExA
RegisterClassA
DrawTextExW
DestroyWindow
GetKBCodePage
SetWindowLongA
GetWindowModuleFileNameA
DrawFocusRect
MapVirtualKeyExW
DefWindowProcA
SetProcessWindowStation
ShowScrollBar
RealGetWindowClass
ScrollDC
ShowWindow
SetPropW
GetCursor
GetScrollRange
GetMenuContextHelpId
CascadeWindows
DdeGetData
CharPrevA
CreateWindowExA
GetKeyNameTextA
GetMessageA
MessageBoxExA
MessageBoxW
comctl32
InitCommonControlsEx
DrawInsert
CreatePropertySheetPageW
CreateUpDownControl
ImageList_SetImageCount
kernel32
WideCharToMultiByte
OpenMutexA
InterlockedExchange
GetModuleFileNameW
GetPrivateProfileStructA
GetStringTypeA
GetModuleFileNameA
LockFile
AllocConsole
SetUnhandledExceptionFilter
HeapFree
TerminateProcess
GetCPInfo
GetLastError
GetFullPathNameA
GetStartupInfoW
DeleteCriticalSection
CompareStringW
CreateFileA
HeapReAlloc
HeapDestroy
ReadFile
TlsAlloc
GetOEMCP
FlushFileBuffers
GetProcessHeap
IsDebuggerPresent
SetEnvironmentVariableA
GetFileType
CloseHandle
GetStartupInfoA
CreateMutexA
GetEnvironmentStrings
GetLocaleInfoW
GetCurrentProcessId
SetHandleCount
GetCommandLineW
TlsSetValue
GetProcAddress
GetTimeFormatA
UnhandledExceptionFilter
GetDateFormatA
EnumSystemCodePagesA
WriteConsoleW
LoadLibraryA
ExitProcess
LeaveCriticalSection
TlsGetValue
IsValidLocale
GetProcessHeaps
GetCurrentThread
GetStringTypeW
GetConsoleOutputCP
GetEnvironmentStringsW
SetEnvironmentVariableW
WriteConsoleA
AddAtomA
EnumSystemLocalesA
CompareStringA
GetConsoleCP
GetCommandLineA
FreeLibrary
LCMapStringW
HeapSize
MultiByteToWideChar
GetTimeZoneInformation
GetModuleHandleA
InitializeCriticalSection
QueryPerformanceCounter
GetUserDefaultLCID
GetACP
HeapAlloc
RtlUnwind
SetConsoleCtrlHandler
InterlockedIncrement
GetCurrentThreadId
IsValidCodePage
LCMapStringA
GetLocaleInfoA
GetTickCount
FreeEnvironmentStringsW
SetFilePointer
MoveFileExA
HeapCreate
VirtualFree
GetVersionExA
InterlockedDecrement
VirtualAlloc
GetSystemTimeAsFileTime
SetStdHandle
WriteFile
FreeEnvironmentStringsA
GetConsoleMode
GetNumberFormatW
EnterCriticalSection
Sleep
GetStdHandle
TlsFree
GetCurrentProcess
SetLastError
VirtualQuery
SetSystemTime
comdlg32
ChooseFontA
FindTextA
shell32
ExtractAssociatedIconExA
SHGetDesktopFolder
SHChangeNotify
SheSetCurDrive
SHGetFileInfoA
Sections
.text Size: 613KB - Virtual size: 612KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 54KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ