Static task
static1
Behavioral task
behavioral1
Sample
2ce25173a1207d4ee40f81a572f39167_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2ce25173a1207d4ee40f81a572f39167_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2ce25173a1207d4ee40f81a572f39167_JaffaCakes118
-
Size
133KB
-
MD5
2ce25173a1207d4ee40f81a572f39167
-
SHA1
93c53f33302c9cf4aa47992ea629ea39599c4df9
-
SHA256
c49a8ae043194121af9a2c69a1ded6650b77d884e0319e588251365962ed57b9
-
SHA512
217b6c9b69f8da9c007039d5f5a04692a6a243e8a14f77fc5f54c90acb4f0405cec297aebda3aa7bd3130ac84855f5c9b9e3a9f7a44a39c440f6b5590ad0a47f
-
SSDEEP
3072:rESuFV9h8stF9hyGDlnQ72+tinJTAaxLJKHz:gmG9cGDlQ7ftudn0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ce25173a1207d4ee40f81a572f39167_JaffaCakes118
Files
-
2ce25173a1207d4ee40f81a572f39167_JaffaCakes118.exe windows:4 windows x86 arch:x86
654dda758450bf592f25a7208df57820
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryA
ExitProcess
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GlobalAddAtomA
IsDebuggerPresent
LoadLibraryA
LocalFileTimeToFileTime
RtlUnwind
VirtualAlloc
VirtualFree
lstrcpynA
user32
EndPaint
GetClassInfoA
GetClientRect
GetFocus
InvalidateRect
LoadCursorA
PostQuitMessage
PtInRect
TrackPopupMenu
UpdateWindow
gdi32
CombineRgn
DeleteEnhMetaFile
ExcludeClipRect
GetObjectA
SetTextColor
shell32
ExtractIconW
SHGetPathFromIDListA
SHGetSettings
SHGetSpecialFolderPathA
ShellExecuteExA
ShellExecuteExW
Sections
.text Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ