k:\
Static task
static1
Behavioral task
behavioral1
Sample
2eb2058ce7acc39b22cd8897c6a1fe5d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2eb2058ce7acc39b22cd8897c6a1fe5d_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2eb2058ce7acc39b22cd8897c6a1fe5d_JaffaCakes118
-
Size
934KB
-
MD5
2eb2058ce7acc39b22cd8897c6a1fe5d
-
SHA1
e5ef45d77758f6a6d2686082771eebdde281d913
-
SHA256
817fe0219ffb2e29c00be4c59f75c4e5c97475e53d3cf37a9255168a84206ab2
-
SHA512
a429794b2309059c5801cb3dc9ff667e45983e244cac788a2b4bfd0686ba7c901fa7cd74b50084df3784c123a7252fcc8e0bc2c5ecc6420057cbe019c88cb88d
-
SSDEEP
24576:KIiQBaGrecFndY/Va/mXnBQwb83Rj+GdMrkjmM8wIgVmHOZW+IQ:KLQBaGreeY/EeBXI3RjpGkiM8wIgVmHq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2eb2058ce7acc39b22cd8897c6a1fe5d_JaffaCakes118
Files
-
2eb2058ce7acc39b22cd8897c6a1fe5d_JaffaCakes118.exe windows:4 windows x86 arch:x86
b24c5b53ab441dc62f27e7c224f33d31
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
DrawInsert
ImageList_Read
ImageList_Destroy
kernel32
CompareStringA
SetEnvironmentVariableA
TlsFree
CloseHandle
GetEnvironmentStringsW
IsBadWritePtr
GetFileType
GetStringTypeA
HeapDestroy
GetProcAddress
HeapFree
VirtualFree
EnterCriticalSection
SetLastError
InterlockedExchange
FillConsoleOutputCharacterA
VirtualQuery
GetModuleHandleA
TerminateProcess
LeaveCriticalSection
EnumResourceTypesA
ExitProcess
FreeEnvironmentStringsA
CreateMutexA
UnhandledExceptionFilter
GetACP
GetStdHandle
LCMapStringW
GetCPInfo
GetOEMCP
GetStringTypeW
GetEnvironmentStrings
GetCurrentThread
OpenMutexA
GetSystemTimeAsFileTime
GetCommandLineA
WriteFile
ReadFile
GetLocalTime
TlsGetValue
HeapAlloc
HeapReAlloc
GetCurrentProcess
InitializeCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
RtlUnwind
InterlockedDecrement
MultiByteToWideChar
GetTickCount
GetCurrentProcessId
GetEnvironmentStringsA
OpenFileMappingW
HeapCreate
VirtualAlloc
LockResource
GetStartupInfoA
GetLastError
TlsAlloc
GetCurrentThreadId
SetFilePointer
CompareStringW
GetSystemTime
FlushFileBuffers
LoadLibraryA
GetVersion
InterlockedIncrement
LCMapStringA
SetStdHandle
TlsSetValue
QueryPerformanceCounter
GetTimeZoneInformation
SetHandleCount
DeleteCriticalSection
comdlg32
FindTextW
wininet
InternetCheckConnectionW
user32
GetNextDlgGroupItem
GetClassLongW
DefWindowProcW
IsCharLowerA
ChangeDisplaySettingsExW
GetListBoxInfo
GetWindowDC
DrawAnimatedRects
GetWindowLongW
SetWindowTextW
MessageBoxW
RegisterClassA
DestroyWindow
SetLastErrorEx
CreateWindowExA
GetClassNameW
ValidateRgn
InsertMenuItemW
CreateCaret
MessageBoxIndirectW
GetDCEx
ReuseDDElParam
GetMessageW
ShowWindow
GetClassInfoA
RegisterClassExA
RealGetWindowClass
RemovePropW
Sections
.text Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 241KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 554KB - Virtual size: 536KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ