Static task
static1
Behavioral task
behavioral1
Sample
2d2771d5a78d545af504ae2528bcc865_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2d2771d5a78d545af504ae2528bcc865_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2d2771d5a78d545af504ae2528bcc865_JaffaCakes118
-
Size
108KB
-
MD5
2d2771d5a78d545af504ae2528bcc865
-
SHA1
e57d20ac80228a7712d7f8b08d82bda8d2170a6e
-
SHA256
9fff18c1cc855c8e9e3af0c726b24d549b48d8bb17a2d270b5341b472eddd1c5
-
SHA512
e16c7a7cb9e893e75ea7c4d4fb491c008907178ddcf994ee367244b393a2e85f3dea2508622e141a84cc6d8a8d76bab8a1c90f9b3d738ee92b2b23d65f04c2f9
-
SSDEEP
1536:AdKWk2RKCqDyi0xY5eTmvw0j0Y6+8rCfe+p8qEgkq804:AAwzi0GZvw9Y6prae+p8XDP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d2771d5a78d545af504ae2528bcc865_JaffaCakes118
Files
-
2d2771d5a78d545af504ae2528bcc865_JaffaCakes118.exe windows:4 windows x86 arch:x86
d5ea15b5851add8df9dee74197eadf9e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
kernel32
VirtualQuery
GetStdHandle
FindFirstFileA
FindClose
GetSystemDefaultLangID
ExitThread
GetDiskFreeSpaceA
VirtualAllocEx
Sleep
GlobalAlloc
MoveFileExA
SetThreadLocale
VirtualFree
GetModuleHandleA
GetProcAddress
gdi32
SaveDC
CopyEnhMetaFileA
CreatePalette
GetDIBColorTable
GetPixel
BitBlt
GetClipBox
CreateBrushIndirect
SetPixel
user32
SetClipboardData
EnumWindows
GetSubMenu
PeekMessageA
IsRectEmpty
CheckMenuItem
TranslateMDISysAccel
DrawEdge
GetWindowLongW
DefMDIChildProcA
GetClassNameA
IsDialogMessageA
RegisterClipboardFormatA
ScreenToClient
ChildWindowFromPoint
InsertMenuA
FrameRect
IsWindow
GetMenuItemID
wsprintfA
MsgWaitForMultipleObjects
IsWindowVisible
GetWindowTextA
GetKeyboardLayoutList
IsWindowEnabled
EnableScrollBar
WaitMessage
GetSystemMenu
FindWindowA
CreateWindowExA
OpenClipboard
LoadStringA
MessageBeep
GetFocus
GetKeyboardLayout
GetCapture
ScrollWindow
DrawMenuBar
LoadCursorA
SetScrollRange
RegisterWindowMessageA
GetDlgItem
GetMenuItemCount
UnhookWindowsHookEx
GetSystemMetrics
DispatchMessageW
IntersectRect
FillRect
SetWindowsHookExA
DestroyMenu
CreatePopupMenu
CallNextHookEx
InsertMenuItemA
PostQuitMessage
CharNextA
SendMessageW
ShowOwnedPopups
PostMessageA
MapVirtualKeyA
ActivateKeyboardLayout
DefWindowProcA
CloseClipboard
GetScrollInfo
DrawIcon
DefFrameProcA
GetWindowRect
WindowFromPoint
RegisterClassA
GetIconInfo
RedrawWindow
TranslateMessage
MessageBoxA
AdjustWindowRectEx
GetMenuItemInfoA
GetDCEx
SetMenu
GetWindow
ShowWindow
GetSysColorBrush
GetCursor
EnumThreadWindows
DrawFrameControl
EndPaint
OemToCharA
SetClassLongA
GetPropA
DispatchMessageA
GetActiveWindow
GetClipboardData
SetCursor
EnumChildWindows
SetPropA
SetForegroundWindow
GetWindowPlacement
DrawAnimatedRects
shell32
SHGetDesktopFolder
SHFileOperationA
SHGetFileInfoA
Sections
CODE Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE