Static task
static1
Behavioral task
behavioral1
Sample
2965a9b249f651a2349c68044ab4a853_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2965a9b249f651a2349c68044ab4a853_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2965a9b249f651a2349c68044ab4a853_JaffaCakes118
-
Size
401KB
-
MD5
2965a9b249f651a2349c68044ab4a853
-
SHA1
a71f22f34f4190718c7762e889b72402a17fd840
-
SHA256
e4d9176930c65fe093182a22bd4bb54101b92ca9f0419e62eadc1a0eeb483e61
-
SHA512
2840a95017f892551c9f9e8fe77cbf68daabc65546af5ffb7e05e26f68e8fe719e53946f0656bf1a699e09ecb806067860cd4dbf04f12c99396896b22739e9f2
-
SSDEEP
12288:p/fqUBjt0InzVsbG+DmHyDsncOj9/0dVVV:fjt0IyavyTG9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2965a9b249f651a2349c68044ab4a853_JaffaCakes118
Files
-
2965a9b249f651a2349c68044ab4a853_JaffaCakes118.exe windows:4 windows x86 arch:x86
565c90755471850ba8814c8cd65738c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
CreateFileA
GetModuleHandleW
LocalAlloc
CloseHandle
WriteFile
SetFilePointer
CopyFileA
FindClose
FindNextFileA
FlushViewOfFile
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceExA
VirtualProtect
GetProcAddress
SetLastError
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetOEMCP
GetFileSize
GetCPInfo
HeapReAlloc
HeapAlloc
RtlUnwind
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStringTypeW
HeapFree
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GlobalAlloc
GlobalFree
LoadLibraryA
GetTempPathA
VirtualAlloc
GetLastError
GetModuleHandleA
Sleep
CreateMutexA
GetACP
VirtualFree
user32
UpdateWindow
DefWindowProcA
GetClientRect
CreateWindowExA
ShowWindow
MoveWindow
GetWindowLongA
GetDC
LoadCursorA
RegisterClassExA
GetIconInfo
GetMessageA
TranslateAcceleratorA
DispatchMessageA
LoadAcceleratorsA
IsWindow
IsWindowVisible
SetWindowRgn
LoadIconA
DrawIcon
DestroyIcon
ReleaseDC
CreateIconIndirect
EndDialog
LoadStringA
DialogBoxParamA
DestroyWindow
BeginPaint
DrawTextA
EndPaint
PostQuitMessage
TranslateMessage
gdi32
GetDIBits
CreateDCA
CreatePen
CreateSolidBrush
Rectangle
DeleteObject
SelectObject
EnumObjects
CreateCompatibleBitmap
GetObjectA
ole32
CoUninitialize
CoInitialize
pdh
PdhCollectQueryData
PdhAddCounterA
PdhOpenQueryA
Sections
.text Size: 168KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 421KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mss Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.msl Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ems Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ead Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.efx Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE