Static task
static1
Behavioral task
behavioral1
Sample
2f3d2db5f7f90c23a2f9f4d58d24f23d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2f3d2db5f7f90c23a2f9f4d58d24f23d_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2f3d2db5f7f90c23a2f9f4d58d24f23d_JaffaCakes118
-
Size
84KB
-
MD5
2f3d2db5f7f90c23a2f9f4d58d24f23d
-
SHA1
024f2def24b93fbafc58a87412d00352a368d0f3
-
SHA256
b971424dd88b6b7bad49273044dabd9783c066d3b9b573c62cb46188c78c4087
-
SHA512
55c001c0f95e992a5134959ab2e2080dcb1c4092f5dd1eb6c8df38cbbd157fde3cafd09153deebc8af90cdf70f03705b0f4f7d4b26c3a21a471991e7699e83ad
-
SSDEEP
1536:855IXybMV0HK6IQ18E8jTsduRS+gkomSA6EItFc:8z82qYmEETVSEomSREMFc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f3d2db5f7f90c23a2f9f4d58d24f23d_JaffaCakes118
Files
-
2f3d2db5f7f90c23a2f9f4d58d24f23d_JaffaCakes118.exe windows:4 windows x86 arch:x86
c18154bc9c92f142c05030be74312b4e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__p__commode
__p__fmode
__set_app_type
_adjust_fdiv
_controlfp
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
free
memset
sprintf
_snprintf
memcpy
malloc
strncpy
srand
strlen
_except_handler3
rand
ws2_32
send
recv
socket
kernel32
GetFileAttributesA
GetLastError
LoadResource
SizeofResource
LockResource
GetTickCount
SetFileAttributesW
OutputDebugStringA
GetModuleHandleA
OutputDebugStringW
GetProcAddress
Sleep
SetLastError
GetModuleFileNameA
TerminateProcess
GetStartupInfoA
FindResourceA
user32
MessageBoxW
MessageBoxA
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ