Static task
static1
Behavioral task
behavioral1
Sample
2d05400de2662af1fd617ad276673f56_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2d05400de2662af1fd617ad276673f56_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2d05400de2662af1fd617ad276673f56_JaffaCakes118
-
Size
112KB
-
MD5
2d05400de2662af1fd617ad276673f56
-
SHA1
f182d690e7cfa4c8f12441eada4aa76e7e8470fb
-
SHA256
426d557bb40061648f317e28b516821c10dd901113937bf2c91e2721bb8e5930
-
SHA512
da231c0bfc4b493b50fb45de6eafae2b3edac02124b2d23886b5ef16bf8e28fbcf4ad78cd814a74f66f38d67d7b573afdf59ca8c6d63007e6b00e68db6272004
-
SSDEEP
1536:f9w1d3EDgIi4WLbnmqkN72G5qlAAhK/i/pBQTX21qZcIUoIFB6:Vwd3EgT4WLbmx7Sldh2McQ6croIFB6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d05400de2662af1fd617ad276673f56_JaffaCakes118
Files
-
2d05400de2662af1fd617ad276673f56_JaffaCakes118.exe windows:4 windows x86 arch:x86
5c9ecba8cba476acb6bde34174ed3759
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
GetLogicalDrives
GetModuleFileNameA
MulDiv
GlobalFree
GlobalAlloc
OpenProcess
FreeLibrary
GetProcAddress
LoadLibraryA
GetVersionExA
TerminateProcess
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
WriteFile
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
WinExec
HeapDestroy
CreateFileA
GetFileType
GetStdHandle
SetHandleCount
SetFilePointer
ReadFile
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
HeapSize
GetOEMCP
GetACP
GetCPInfo
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindNextFileA
FindFirstFileA
GetLastError
HeapAlloc
HeapReAlloc
HeapFree
GetCurrentProcess
ExitProcess
GetLocalTime
GetSystemTime
GetTimeZoneInformation
GetFileAttributesA
RtlUnwind
DeleteFileA
Sleep
GetLogicalDriveStringsA
GetVolumeInformationA
SetErrorMode
CloseHandle
DeviceIoControl
Beep
CopyFileA
GetSystemDirectoryA
GetEnvironmentVariableA
GetWindowsDirectoryA
HeapCreate
GetVersion
user32
GetDlgItemInt
GetDlgItemTextA
GetWindowTextLengthA
GetDlgItem
RegisterWindowMessageA
RegisterClassExA
EndDialog
DialogBoxParamA
BeginPaint
GetClientRect
FillRect
MoveWindow
DrawTextA
EndPaint
PostQuitMessage
GetSystemMetrics
LoadCursorA
UpdateWindow
SendMessageA
MessageBoxA
SetWindowPos
ShowWindow
wsprintfA
SetDlgItemTextA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
SetActiveWindow
FindWindowA
DefWindowProcA
GetCursorPos
SetForegroundWindow
TrackPopupMenu
PostMessageA
GetMenuItemID
LoadMenuA
GetSubMenu
DestroyMenu
SetMenuDefaultItem
LoadStringA
KillTimer
SetTimer
LoadIconA
DestroyWindow
CreateWindowExA
SendDlgItemMessageA
gdi32
CreateFontA
CreateSolidBrush
SetBkMode
SelectObject
SetTextColor
GetDeviceCaps
advapi32
RegDeleteValueA
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
shell32
Shell_NotifyIconA
winmm
mciSendCommandA
Sections
.text Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ