K:\EEEEPSUEV\VOTBOGJRJ\E
Static task
static1
Behavioral task
behavioral1
Sample
2e583bd1e47a45737ffc4bd2367128fe_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2e583bd1e47a45737ffc4bd2367128fe_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2e583bd1e47a45737ffc4bd2367128fe_JaffaCakes118
-
Size
556KB
-
MD5
2e583bd1e47a45737ffc4bd2367128fe
-
SHA1
cdde6fbcab23d2ec46b1fd8da83338f0d466c31a
-
SHA256
3a600293d59f949e36b727b2d5e3890368fa8e82a1c5d3b963071655a1ca3d4d
-
SHA512
452500ee2b83f11bd5241df3fbc36a114cd05dae85402d89a03d63e67f38ebc6c9e231dfe714dbf8b9c4ffd0833b67d03fe48ae09980149605b6e5aa662f86f6
-
SSDEEP
12288:vCL0ZSpIpF2tI1aNVdLRQkM9oK4N25un7UNCjEs:jZSpIn4I1AVxRQko4kU7UNCjE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e583bd1e47a45737ffc4bd2367128fe_JaffaCakes118
Files
-
2e583bd1e47a45737ffc4bd2367128fe_JaffaCakes118.exe windows:4 windows x86 arch:x86
5c1b47b6defc589a1f0056065c54ba43
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
GetObjectW
DeleteObject
GetDeviceCaps
CreateDCW
SetTextColor
FillPath
DeleteDC
user32
CharNextExA
DdeGetData
SetProcessWindowStation
GetThreadDesktop
SetCaretBlinkTime
DdeDisconnectList
ShowCaret
EnumDisplayDevicesW
ScrollWindowEx
EditWndProc
CreateIconFromResourceEx
RegisterDeviceNotificationA
GetClassNameW
GetWindowLongA
CreateWindowExW
ClipCursor
CharUpperW
GetWindowDC
GetClipboardFormatNameA
GetClipboardOwner
RegisterClassExA
DestroyAcceleratorTable
MessageBeep
RegisterHotKey
CreateCaret
RegisterClassA
ShowWindow
CascadeChildWindows
CopyAcceleratorTableA
MessageBoxW
SetPropA
CharLowerBuffA
UnpackDDElParam
SetDlgItemInt
GetScrollRange
DestroyWindow
CreateIconIndirect
DefWindowProcA
CreateWindowExA
CreateMDIWindowA
advapi32
RegConnectRegistryW
CryptSetProviderExW
RegReplaceKeyW
comctl32
ImageList_ReplaceIcon
DrawStatusText
CreateMappedBitmap
CreateToolbar
ImageList_Read
ImageList_SetIconSize
ImageList_DrawIndirect
ImageList_AddIcon
GetEffectiveClientRect
CreateUpDownControl
ImageList_Merge
ImageList_LoadImage
InitCommonControlsEx
CreateToolbarEx
ImageList_AddMasked
ImageList_SetOverlayImage
ImageList_GetImageRect
ImageList_LoadImageW
ImageList_GetDragImage
kernel32
TlsSetValue
VirtualAlloc
GetSystemDirectoryA
GetOEMCP
TerminateProcess
VirtualFree
GetSystemInfo
GetProcAddress
QueryPerformanceCounter
HeapFree
GetLocaleInfoA
ReadFile
HeapCreate
GetTimeFormatA
WriteFile
CompareStringW
GetProcessShutdownParameters
LCMapStringW
EnterCriticalSection
GetDateFormatA
IsBadWritePtr
GetVersionExA
GetStringTypeA
InitializeCriticalSection
TlsAlloc
TlsGetValue
FlushFileBuffers
GetStartupInfoA
SetEnvironmentVariableA
HeapAlloc
GetCurrentProcess
GetLocaleInfoW
GetEnvironmentStrings
UnhandledExceptionFilter
GetLastError
SetFilePointer
CreateMutexA
FreeEnvironmentStringsA
SetHandleCount
TlsFree
GetCPInfo
VirtualProtect
EnumSystemLocalesA
GetUserDefaultLCID
GetFileType
LoadLibraryA
CompareStringA
GetStringTypeW
GetTimeZoneInformation
lstrcpynW
WideCharToMultiByte
FreeEnvironmentStringsW
UnlockFile
GetCommandLineA
GetACP
GetEnvironmentStringsW
GetTickCount
VirtualQuery
ExitProcess
DeleteFileW
IsValidLocale
OpenMutexA
GetSystemTimeAsFileTime
MultiByteToWideChar
HeapDestroy
GetStdHandle
InterlockedExchange
LCMapStringA
IsValidCodePage
GetModuleHandleA
DeleteCriticalSection
RtlUnwind
CloseHandle
HeapSize
GetModuleFileNameA
HeapReAlloc
SetLastError
SetStdHandle
LeaveCriticalSection
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
Sections
.text Size: 156KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 257KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ