Static task
static1
Behavioral task
behavioral1
Sample
2ff1e0333aca8f1895c2d60b345c3a22_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2ff1e0333aca8f1895c2d60b345c3a22_JaffaCakes118.exe
Resource
win10v2004-20240708-en
General
-
Target
2ff1e0333aca8f1895c2d60b345c3a22_JaffaCakes118
-
Size
393KB
-
MD5
2ff1e0333aca8f1895c2d60b345c3a22
-
SHA1
222f15b681ad2ae12e6b9aa745514352b43fb328
-
SHA256
5d11bb5c45d21b9412656f7c2f94ef351dbcb2ea3a7fbd7e4b09ed9b0ae23859
-
SHA512
dbd4589338c332b0e0c18c7d9a57a4f7b6f9b40df4a335bc0bde12bf702962e0c0ec3e6719268bdd72da23f9ce0c338780237645b414febb3d28e32199c924d6
-
SSDEEP
12288:5rBg7dUmmLen1G6Lkjr7plWzuDRsVqyMIe:xBg7dkenE6Qf7fpuzq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ff1e0333aca8f1895c2d60b345c3a22_JaffaCakes118
Files
-
2ff1e0333aca8f1895c2d60b345c3a22_JaffaCakes118.exe windows:4 windows x86 arch:x86
1361bd2d88a300e9de661e50750258a0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetModuleHandleA
GetConsoleAliasA
WaitForMultipleObjects
CreateFileMappingA
GetLastError
LocalLock
FindAtomA
TlsGetValue
FreeEnvironmentStringsA
GlobalUnlock
CloseHandle
FindClose
LocalFree
HeapCreate
GetConsoleCP
CreateFileA
GetACP
GetCalendarInfoA
LoadLibraryExA
user32
DrawEdge
DrawTextA
GetDlgItem
FillRect
GetDC
DefWindowProcA
GetIconInfo
SetFocus
DispatchMessageA
IsWindow
CheckRadioButton
CascadeWindows
CallWindowProcA
MessageBoxA
setupapi
SetupCloseInfFile
CM_Add_IDA
CM_Add_Range
SetupCloseLog
CMP_Report_LogOn
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ