Static task
static1
Behavioral task
behavioral1
Sample
2d4a54f13f6022430ff958e30518d3fa_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2d4a54f13f6022430ff958e30518d3fa_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2d4a54f13f6022430ff958e30518d3fa_JaffaCakes118
-
Size
952KB
-
MD5
2d4a54f13f6022430ff958e30518d3fa
-
SHA1
62045e141c03599411445296124553f48af53d83
-
SHA256
04eb3dde16dc908bf432883737f23a7c68915f7b552278e60cc3e6b88eb52528
-
SHA512
314f0ca2f8121e883f690bc23ec00d48c3f4e284e48a6c1f88b07fff43ff248a830385001cf070ff8871ae982f334190b2e847b480ae7f5a09b3388b631928f1
-
SSDEEP
24576:MV1Aqgt/iAWoVMqHxnxSzNFEYHZGGxYXeWVlP:w1g/BzxSzTHZQuWVlP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d4a54f13f6022430ff958e30518d3fa_JaffaCakes118
Files
-
2d4a54f13f6022430ff958e30518d3fa_JaffaCakes118.exe windows:4 windows x86 arch:x86
9e99925da5d482505fbf52920870e75a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ConnectNamedPipe
GetDiskFreeSpaceW
GenerateConsoleCtrlEvent
SetEvent
GetCompressedFileSizeW
EnumSystemCodePagesA
GetConsoleMode
GetOEMCP
SetProcessWorkingSetSize
FindFirstFileW
ExpandEnvironmentStringsW
EnumResourceLanguagesW
DebugBreak
GetThreadContext
CreateDirectoryA
lstrcpynA
WriteFile
CreateMutexA
OutputDebugStringW
GetTempFileNameA
GetProcessHeap
WritePrivateProfileSectionW
SetNamedPipeHandleState
GetDriveTypeW
EndUpdateResourceA
DuplicateHandle
SetEndOfFile
EnumCalendarInfoW
QueryDosDeviceW
GetTimeZoneInformation
CreatePipe
FillConsoleOutputCharacterA
TryEnterCriticalSection
GlobalDeleteAtom
_hread
MultiByteToWideChar
ExitThread
GetModuleFileNameW
WriteConsoleOutputW
VirtualQuery
EnumTimeFormatsW
DosDateTimeToFileTime
FormatMessageA
CreateDirectoryW
FlushFileBuffers
GetTempPathW
FatalAppExitA
PeekConsoleInputW
SetConsoleOutputCP
SearchPathW
GetDriveTypeA
ClearCommBreak
SetThreadPriorityBoost
ExitProcess
user32
ShowWindow
IntersectRect
CreateDesktopW
TranslateAcceleratorA
FrameRect
AdjustWindowRect
LoadCursorA
keybd_event
GetClipCursor
GetUserObjectInformationW
GetScrollRange
DialogBoxParamA
SendMessageTimeoutA
EmptyClipboard
CreateWindowStationW
GetClassNameA
SwitchToThisWindow
GetSysColorBrush
GetClassNameW
TileWindows
ToAscii
SetClassLongA
EnumDesktopsW
SwitchDesktop
CharToOemW
ChangeDisplaySettingsW
CreateWindowExA
ArrangeIconicWindows
GetMenuItemInfoA
SetWindowsHookW
CharLowerBuffW
IsCharAlphaNumericW
HiliteMenuItem
GetClipboardFormatNameA
GetCapture
SetClipboardViewer
SetThreadDesktop
GetKeyboardLayoutNameA
SetClassLongW
SetDlgItemTextA
DestroyCaret
GrayStringA
DefMDIChildProcA
DialogBoxParamW
DefFrameProcW
RegisterHotKey
GetMenuItemRect
InSendMessage
DestroyIcon
LoadIconA
LoadMenuW
ClipCursor
SetCursorPos
DispatchMessageW
ChangeDisplaySettingsA
GetShellWindow
SetCaretBlinkTime
OpenDesktopW
EnumDisplaySettingsA
MessageBoxExA
SetDlgItemTextW
PeekMessageW
gdi32
CreateCompatibleDC
GetObjectA
CopyMetaFileA
SetBitmapDimensionEx
SetROP2
FillPath
comdlg32
PrintDlgW
GetSaveFileNameW
GetOpenFileNameW
ReplaceTextA
advapi32
EnumServicesStatusW
OpenProcessToken
AbortSystemShutdownA
RegLoadKeyA
shell32
FindExecutableA
SHGetPathFromIDListA
ExtractIconExW
ShellExecuteA
ole32
OleSaveToStream
PropVariantCopy
CoInitializeEx
MkParseDisplayName
CoTaskMemRealloc
oleaut32
SafeArrayUnaccessData
Sections
.text Size: 3KB - Virtual size: 219KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 616KB - Virtual size: 616KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ