Static task
static1
Behavioral task
behavioral1
Sample
2d51996b920141d8703e602bcb1a6de6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2d51996b920141d8703e602bcb1a6de6_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2d51996b920141d8703e602bcb1a6de6_JaffaCakes118
-
Size
272KB
-
MD5
2d51996b920141d8703e602bcb1a6de6
-
SHA1
3237a42f74a9c335f7a7088d19905c6aa6d7cf51
-
SHA256
8c3006ee06c8e5f2ba209c8018555895ccd556aa90eb278bd06d2fa8826fcb15
-
SHA512
62a11731cb950f2572a4bdb73b2e665a7953142c2173a3e9ad3cdc34a3e013abb44bcf684bec74a93efaba034bd688265eabb668177714fcd1ff7ba5f961894c
-
SSDEEP
6144:klACPE2Ql3aMVPGefzWHRFbPVDL54tVnZXLhEBhYsYr:kvPEzhFVPGefzWHjMDZXyBjYr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d51996b920141d8703e602bcb1a6de6_JaffaCakes118
Files
-
2d51996b920141d8703e602bcb1a6de6_JaffaCakes118.exe windows:4 windows x86 arch:x86
3c527e77d7665cd0de363d71ad567945
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenMutexA
EnumSystemCodePagesW
_lread
AreFileApisANSI
GetTimeZoneInformation
FindFirstFileA
GetLongPathNameA
PrepareTape
GetPrivateProfileStringW
GetTapeParameters
VirtualFree
CreateMutexW
GetStartupInfoA
GetCurrentDirectoryW
ReadConsoleOutputA
WriteConsoleOutputW
GlobalReAlloc
GetFileAttributesA
CloseHandle
ExitProcess
SetConsoleOutputCP
SetConsoleActiveScreenBuffer
EnumResourceNamesA
ReadDirectoryChangesW
SetVolumeLabelA
MoveFileW
GetSystemDirectoryW
FreeResource
LocalReAlloc
MoveFileExA
SizeofResource
GetCPInfo
IsBadStringPtrA
lstrcmpA
GetFileInformationByHandle
ReadFile
GetVersionExA
VirtualAllocEx
SetCommMask
GetACP
GetVolumeInformationW
GetEnvironmentVariableW
LoadResource
SetStdHandle
VirtualUnlock
GetConsoleMode
VirtualProtect
lstrlenA
FindResourceExW
VirtualAlloc
GetModuleHandleA
user32
SetScrollInfo
ClipCursor
DialogBoxIndirectParamW
TrackMouseEvent
EnumDisplaySettingsA
GetWindow
ShowOwnedPopups
WindowFromDC
CreateWindowExW
OpenDesktopW
SetWindowsHookW
ChangeDisplaySettingsW
GetThreadDesktop
GetTabbedTextExtentW
IsDlgButtonChecked
CreateWindowExA
GetUpdateRect
TranslateAcceleratorA
DestroyWindow
CharLowerA
DefFrameProcW
PeekMessageW
KillTimer
LoadStringW
OemToCharA
GetDialogBaseUnits
RegisterClipboardFormatW
CharPrevW
GetClipboardFormatNameW
EnumDisplaySettingsExA
LoadImageA
UnregisterClassW
EnumClipboardFormats
FindWindowExA
MonitorFromPoint
SetMenu
GetCursorPos
FlashWindow
GetClipboardSequenceNumber
VkKeyScanA
gdi32
GetClipRgn
comdlg32
ReplaceTextA
PageSetupDlgW
ReplaceTextW
ChooseFontA
advapi32
RevertToSelf
CryptGetUserKey
GetCurrentHwProfileW
GetFileSecurityA
RegOpenKeyExA
shell32
SHLoadInProc
DragQueryPoint
SHFileOperationW
ExtractIconA
SHChangeNotify
SHGetSpecialFolderLocation
ole32
IIDFromString
CoCreateInstance
OleConvertIStorageToOLESTREAM
CoGetObject
StgOpenStorage
oleaut32
SafeArrayRedim
VariantCopy
LoadTypeLibEx
QueryPathOfRegTypeLi
SafeArrayGetElement
SafeArrayPutElement
SetErrorInfo
comctl32
ImageList_GetIcon
InitCommonControlsEx
ImageList_Merge
ImageList_DrawIndirect
shlwapi
SHSetThreadRef
StrCatW
StrChrA
PathIsDirectoryA
PathFindExtensionA
PathQuoteSpacesA
StrChrIA
wnsprintfW
PathIsRelativeA
PathFindNextComponentW
SHRegOpenUSKeyW
PathIsRootW
UrlIsW
msvcrt
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
Sections
.text Size: 236KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE