Static task
static1
Behavioral task
behavioral1
Sample
2d60e8a5f246da135b25cc13fe8fa1ec_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2d60e8a5f246da135b25cc13fe8fa1ec_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2d60e8a5f246da135b25cc13fe8fa1ec_JaffaCakes118
-
Size
344KB
-
MD5
2d60e8a5f246da135b25cc13fe8fa1ec
-
SHA1
5a9e36e8f7a814d1806059f2b43926daf30b8984
-
SHA256
177e47039125fadefffdd63d9814270d893f414aad752ef8055a640203d95c11
-
SHA512
b5e20112155be3cdf8c5a2fc10a148498ee3ddc3db54876c46ae3a49ccabf59b8bf495cd830da4746b7a3524e3c7ff65205f5ccbe84393d8fd0f1735fecaa8c9
-
SSDEEP
6144:QyOiNhun4tEA5nua8ShROsONTcvzBiXGRaVeJPB6aFIQh4W:bl5Z8SNONQbBiX4m8eQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d60e8a5f246da135b25cc13fe8fa1ec_JaffaCakes118
Files
-
2d60e8a5f246da135b25cc13fe8fa1ec_JaffaCakes118.exe windows:4 windows x86 arch:x86
4326f33394b3e853e490af9915fe5268
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileW
TryEnterCriticalSection
_llseek
DeleteCriticalSection
IsDBCSLeadByteEx
CreateDirectoryA
SetupComm
ReadConsoleOutputA
GetTimeZoneInformation
SetEndOfFile
GetSystemTime
SetProcessAffinityMask
CreateDirectoryW
WriteConsoleOutputW
GetNumberFormatW
LocalLock
SetEvent
FreeEnvironmentStringsA
SetNamedPipeHandleState
VirtualQueryEx
GetCurrentDirectoryW
Beep
GetProfileStringA
GetFileAttributesExA
FindFirstFileA
SearchPathW
SystemTimeToFileTime
GetCommandLineW
lstrcatW
RemoveDirectoryW
SetThreadLocale
GlobalAddAtomA
OpenMutexA
QueryDosDeviceW
WritePrivateProfileStructA
GetSystemDefaultLangID
DuplicateHandle
GetLocaleInfoW
FindResourceExA
VirtualLock
GetConsoleMode
lstrcpynA
lstrcmpiA
GetFileAttributesA
WritePrivateProfileStringA
SetConsoleOutputCP
GetPrivateProfileStringA
GlobalAddAtomW
VirtualProtect
GetVersionExA
CompareStringW
OpenSemaphoreW
GetProcessHeap
GetSystemDirectoryW
GetBinaryTypeW
OutputDebugStringW
SetProcessWorkingSetSize
_hread
SetProcessShutdownParameters
GetTickCount
LocalAlloc
GetSystemTimeAsFileTime
TlsGetValue
SetThreadPriorityBoost
GetTapeStatus
EraseTape
GetEnvironmentVariableW
_lclose
EnumResourceNamesW
WriteFile
GetComputerNameW
SetConsoleMode
GetCommandLineA
EnumResourceLanguagesW
ExitProcess
user32
SetClassLongW
PeekMessageW
SetClassLongA
CreateDesktopA
IsCharAlphaNumericA
SendDlgItemMessageA
CharPrevW
DestroyIcon
CheckRadioButton
CopyAcceleratorTableA
CreateCursor
GetKeyboardLayoutNameA
GetDlgItemTextW
CreateAcceleratorTableA
GetScrollInfo
GetDlgItemTextA
RegisterClassExW
DefFrameProcA
LookupIconIdFromDirectory
ModifyMenuW
ValidateRect
GetClassInfoExW
GetMenuItemID
DrawFocusRect
AppendMenuW
PostMessageW
SendInput
CreateDialogIndirectParamW
DestroyCaret
ChangeClipboardChain
MsgWaitForMultipleObjects
PostThreadMessageA
IsRectEmpty
CreateMenu
gdi32
RectInRegion
ChoosePixelFormat
SelectClipPath
ScaleWindowExtEx
GetTextFaceA
GetTextCharset
GetCurrentObject
PolyDraw
OffsetClipRgn
PtInRegion
PaintRgn
SetColorAdjustment
GetObjectW
GetClipBox
CreateFontW
EndPage
advapi32
CryptDeriveKey
RegisterServiceCtrlHandlerA
CryptGetHashParam
CryptGetProvParam
CreateProcessAsUserA
shell32
SHAddToRecentDocs
SHGetPathFromIDListA
ShellExecuteA
DragFinish
ole32
CoMarshalInterface
OleSetClipboard
oleaut32
SafeArrayUnaccessData
comctl32
ImageList_SetImageCount
shlwapi
PathIsRelativeA
StrChrW
SHRegQueryUSValueW
AssocQueryStringW
SHRegWriteUSValueW
SHDeleteKeyA
UrlCombineW
StrTrimA
setupapi
SetupOpenAppendInfFileW
SetupDiGetINFClassA
SetupCommitFileQueueA
Sections
.text Size: 316KB - Virtual size: 313KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE