Static task
static1
Behavioral task
behavioral1
Sample
2d75e6a976fd8c18b30dcbe7d616aaf1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2d75e6a976fd8c18b30dcbe7d616aaf1_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2d75e6a976fd8c18b30dcbe7d616aaf1_JaffaCakes118
-
Size
308KB
-
MD5
2d75e6a976fd8c18b30dcbe7d616aaf1
-
SHA1
ee662e052208b2b425585cd3f03b4d02b77ce070
-
SHA256
a4f62aad5de2c4430bb0c75032d4dacaa874395db15a3789ef98f10f67287ec6
-
SHA512
c267cc65c1267fd5175347e10090f76f0599c176f915b93af0810bfe4b1c88c69b7b7b2f5ec1fd211e56fd50c288bea3dcdb7690032fb04d0be0efcd25368f02
-
SSDEEP
6144:B073Gk2CioI7sGF/X3uhOXaJrtb8Az9fUhntJg4aYnmMQ3:B07v2lRx54OXUrtb8A2hPg4a0mX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d75e6a976fd8c18b30dcbe7d616aaf1_JaffaCakes118
Files
-
2d75e6a976fd8c18b30dcbe7d616aaf1_JaffaCakes118.exe windows:4 windows x86 arch:x86
08e6650efec90055837b31633e6883e3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProfileStringA
SetVolumeLabelA
WriteConsoleA
GetDateFormatW
CompareStringW
WritePrivateProfileSectionA
CallNamedPipeA
GetSystemDirectoryW
GlobalHandle
WriteConsoleOutputCharacterA
SetEndOfFile
CreateEventW
GetUserDefaultLangID
IsDBCSLeadByte
ReadConsoleOutputA
_lread
GetComputerNameW
WideCharToMultiByte
GlobalMemoryStatus
FillConsoleOutputCharacterA
GetPrivateProfileSectionA
GetModuleHandleA
GetVersionExA
GetSystemInfo
WaitForMultipleObjectsEx
GetFileInformationByHandle
SetTapeParameters
EnumResourceNamesW
SetLocalTime
GetFileAttributesW
SetCommMask
SetEvent
GetLastError
EnumResourceNamesA
EraseTape
CancelIo
GlobalFindAtomW
VirtualProtect
FoldStringW
GetProfileIntA
QueryDosDeviceW
GetDiskFreeSpaceA
WritePrivateProfileStructA
LockFile
GetStartupInfoA
user32
GetThreadDesktop
ExitWindowsEx
InflateRect
IntersectRect
ChangeDisplaySettingsW
GetKeyState
HiliteMenuItem
GetClassLongW
GetKeyboardState
CharUpperA
EnumThreadWindows
mouse_event
TranslateAcceleratorA
EnumDisplaySettingsW
FindWindowA
CreateCursor
SetWindowLongW
RemoveMenu
MonitorFromWindow
CreateDialogParamA
GetKeyNameTextA
EnumDisplayMonitors
ScrollWindowEx
LookupIconIdFromDirectory
gdi32
PathToRegion
CloseMetaFile
GetTextExtentExPointW
PtVisible
EqualRgn
CopyMetaFileA
SetWindowExtEx
SetMapperFlags
SetWorldTransform
GetCharWidthA
SetTextColor
GetObjectType
SetViewportExtEx
GetViewportExtEx
GetPixel
CreateDIBSection
comdlg32
FindTextA
advapi32
GetNamedSecurityInfoW
SetSecurityDescriptorGroup
RegEnumKeyExW
EnumDependentServicesA
RegCreateKeyExW
IsValidSid
CryptGenRandom
DuplicateToken
GetServiceKeyNameW
RegReplaceKeyW
OpenSCManagerW
ChangeServiceConfigW
GetFileSecurityA
AbortSystemShutdownW
GetUserNameA
FreeSid
GetSecurityInfo
CryptDecrypt
CryptReleaseContext
CryptSetHashParam
SetThreadToken
CreateServiceW
SetServiceStatus
GetSecurityDescriptorControl
DeleteAce
CryptGetUserKey
DeleteService
ImpersonateSelf
CryptDestroyHash
EnumDependentServicesW
DeregisterEventSource
AllocateAndInitializeSid
AdjustTokenPrivileges
shell32
ShellExecuteA
SHBrowseForFolderA
ExtractIconW
CommandLineToArgvW
DuplicateIcon
ole32
OleCreateFromData
CoGetClassObject
OleLockRunning
WriteClassStm
StgOpenStorage
OleDraw
oleaut32
SafeArrayAccessData
SafeArrayGetUBound
LoadTypeLibEx
RegisterTypeLi
comctl32
ImageList_GetIconSize
shlwapi
UrlApplySchemeW
PathFileExistsA
StrDupA
StrCpyNW
PathAppendW
ChrCmpIW
SHStrDupW
PathSkipRootW
PathGetDriveNumberW
setupapi
SetupDiSetDeviceRegistryPropertyA
SetupFindFirstLineW
SetupOpenLog
SetupDiGetClassDescriptionW
SetupLogErrorA
SetupDiSetSelectedDriverA
SetupCloseInfFile
SetupDiCallClassInstaller
SetupGetLineTextW
SetupOpenFileQueue
SetupDiClassGuidsFromNameW
SetupGetLineTextA
msvcrt
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
Sections
.text Size: 280KB - Virtual size: 276KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE