Static task
static1
Behavioral task
behavioral1
Sample
2d313b843b201df3d72730360b97009c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2d313b843b201df3d72730360b97009c_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2d313b843b201df3d72730360b97009c_JaffaCakes118
-
Size
58KB
-
MD5
2d313b843b201df3d72730360b97009c
-
SHA1
05bcc251ce3d252251475a81402c43dbc2f532ac
-
SHA256
7d6bd0388687ec220c23bb296fef83a3cb863977f6e284257937315ab5453e4e
-
SHA512
0f2d8cc576cfde660b0b72778d5c5203cf8398c8b80fcf81b7f069656b236df4a9ff4f859f6dd6c83a6907258d5e4440b95dbedcd1a146e07bb74e003adf0cf5
-
SSDEEP
1536:eFFWjjfUvFg0Nr7AL6otokgYOZJdd9rc:zf6xUztxfOZJdjc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d313b843b201df3d72730360b97009c_JaffaCakes118
Files
-
2d313b843b201df3d72730360b97009c_JaffaCakes118.exe windows:4 windows x86 arch:x86
d03f675c61510449d759b7d72715caa7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GlobalFree
GetEnvironmentVariableA
LoadLibraryExA
GetCurrentThreadId
GetExitCodeProcess
CreateMutexA
TlsAlloc
CloseHandle
GetStdHandle
ReleaseMutex
FindResourceA
DeleteAtom
GetProcessHeap
GlobalUnlock
GetModuleHandleA
SetLastError
HeapCreate
TlsGetValue
lstrlenW
user32
DispatchMessageA
SetFocus
DrawMenuBar
GetDlgItem
CreateMenu
GetDC
CallWindowProcA
IsWindow
FillRect
DrawEdge
CheckRadioButton
GetCaretPos
CreateWindowExA
rsaenh
CPDecrypt
CPGenKey
CPHashData
CPDeriveKey
CPSignHash
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 43KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE