Static task
static1
Behavioral task
behavioral1
Sample
2fc10ad4d7b59a5853fd03eef2edb695_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2fc10ad4d7b59a5853fd03eef2edb695_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2fc10ad4d7b59a5853fd03eef2edb695_JaffaCakes118
-
Size
439KB
-
MD5
2fc10ad4d7b59a5853fd03eef2edb695
-
SHA1
9fd26494a55c08fbddbffa3fb67e601089be7fed
-
SHA256
c2163b15de49c5f46b8ba13b621d9487cf87f0bdb62a938d14a3184a4845bb8c
-
SHA512
0b4286dba9bb449589c536caa5af670422fec53b2ec3bc2fb9e5b85c3eeac2baa268f001c270068126b44818f53bf2a7a1289b8fe51e77735daa9ecb54bc4834
-
SSDEEP
12288:D6aojNX/r20iprTLXKgYb4Cw9MsEDJdnXf:DsX/r20QrTL6gaO6sWRf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2fc10ad4d7b59a5853fd03eef2edb695_JaffaCakes118
Files
-
2fc10ad4d7b59a5853fd03eef2edb695_JaffaCakes118.exe windows:4 windows x86 arch:x86
8dc3bef96e915cbaaea2e57175f9c2d5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetTextCharsetInfo
GetTextExtentExPointW
CreateEnhMetaFileW
OffsetRgn
ArcTo
CreateBrushIndirect
MoveToEx
GetCharABCWidthsW
PolyPolygon
AddFontResourceW
SetTextCharacterExtra
EnumFontFamiliesW
comdlg32
GetSaveFileNameA
PageSetupDlgA
GetOpenFileNameW
PrintDlgW
GetSaveFileNameW
PageSetupDlgW
GetOpenFileNameA
GetFileTitleA
GetFileTitleW
ChooseColorW
wininet
GopherGetLocatorTypeW
InternetReadFile
shell32
FindExecutableW
SHAddToRecentDocs
SHBrowseForFolderA
SHFreeNameMappings
SHGetPathFromIDList
ExtractAssociatedIconExW
RealShellExecuteW
SHGetSettings
ShellExecuteEx
RealShellExecuteA
CommandLineToArgvW
SHGetDesktopFolder
RealShellExecuteExW
SHGetSpecialFolderLocation
RealShellExecuteExA
DragQueryFile
SHGetFileInfo
SHInvokePrinterCommandW
ExtractAssociatedIconA
DragFinish
DragQueryFileAorW
kernel32
HeapSize
EnumSystemCodePagesW
TlsFree
VirtualAlloc
GetEnvironmentStrings
GetStartupInfoA
Sleep
lstrlenW
InterlockedExchange
GetCurrentThread
GetStringTypeA
LCMapStringA
GetExitCodeThread
GetModuleHandleA
CompareStringW
SetUnhandledExceptionFilter
GetStdHandle
IsValidLocale
GetProcAddress
DeleteCriticalSection
GetProcessHeap
LockFileEx
WritePrivateProfileStringW
HeapReAlloc
InterlockedIncrement
GetTimeFormatA
FileTimeToSystemTime
EnumSystemLocalesA
GetSystemInfo
HeapFree
GetSystemTimeAsFileTime
TlsSetValue
MoveFileW
SetLastError
GetACP
GetTimeZoneInformation
HeapDestroy
GetLastError
WriteProfileStringA
GetVersionExA
VirtualFree
GetFileType
GetCPInfo
GlobalAddAtomA
InitializeCriticalSection
IsDebuggerPresent
GetCommandLineA
GetLocaleInfoW
WideCharToMultiByte
CreateFileW
GetCurrentProcessId
IsValidCodePage
LoadLibraryA
GetTimeFormatW
UnhandledExceptionFilter
GetTickCount
QueryPerformanceCounter
MultiByteToWideChar
GetStringTypeW
TerminateProcess
IsBadWritePtr
LCMapStringW
EnterCriticalSection
CreateDirectoryExA
GetCurrentThreadId
GetModuleFileNameW
OpenEventA
GetCurrentProcess
GetOEMCP
RtlUnwind
SetHandleCount
HeapAlloc
GetLogicalDrives
GetLongPathNameA
FreeEnvironmentStringsA
GetCommandLineW
GetEnvironmentStringsW
TlsAlloc
GetLocaleInfoA
ExitProcess
GetDateFormatA
SetEnvironmentVariableA
GetProcAddress
TlsGetValue
FindAtomA
FreeEnvironmentStringsW
FreeLibrary
HeapCreate
WriteFile
GetUserDefaultLCID
GetModuleFileNameA
SetConsoleCtrlHandler
GetStartupInfoW
CompareStringA
WritePrivateProfileStructW
LeaveCriticalSection
InterlockedDecrement
VirtualQuery
user32
RealGetWindowClass
FrameRect
SetMenuDefaultItem
CallMsgFilterA
DispatchMessageA
FillRect
GetMenuItemRect
FreeDDElParam
DialogBoxIndirectParamA
UnionRect
AnimateWindow
InflateRect
CascadeWindows
GetWindowRgn
IsCharLowerW
GetScrollInfo
CharPrevExA
Sections
.text Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 277KB - Virtual size: 291KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ