Static task
static1
Behavioral task
behavioral1
Sample
2a1684ce5122789e642838cbccca8cdd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a1684ce5122789e642838cbccca8cdd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2a1684ce5122789e642838cbccca8cdd_JaffaCakes118
-
Size
166KB
-
MD5
2a1684ce5122789e642838cbccca8cdd
-
SHA1
90674cd4b8a8560a6b58179f2f90909e1bf095b5
-
SHA256
1defd16618de2f7dac29cc993cf7cd6de258eca6b899b5eaed09a9df64f1f72c
-
SHA512
44f4216a78efcd27c4e8aaac1369e5e6dbd1da2960bd35917e8478a210bb6cafbb00753c43b40ea3972eff3f8c6a59fcc09e0f28f5e6ebf88ef820c5a1ee6a63
-
SSDEEP
3072:OJx5mosHULfNoyFUhZFKCy726y40Q/7ywrpHb+gTzT:szmHUdzN9XNT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a1684ce5122789e642838cbccca8cdd_JaffaCakes118
Files
-
2a1684ce5122789e642838cbccca8cdd_JaffaCakes118.exe windows:5 windows x86 arch:x86
fdcb2354f781b71b521eb5a9744a2a48
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SelectObject
CreateSolidBrush
DeleteDC
SetTextAlign
SetTextColor
RestoreDC
GetDeviceCaps
SetStretchBltMode
SelectPalette
SaveDC
DeleteObject
CreateCompatibleDC
PatBlt
GetPixel
CreatePalette
CreateFontIndirectA
GetObjectA
RectVisible
SetMapMode
LineTo
CreatePen
GetStockObject
GetTextMetricsA
user32
TranslateMessage
GetParent
CharNextA
GetSystemMetrics
GetDesktopWindow
GetDC
kernel32
GetCurrentProcessId
GetStartupInfoA
GetCurrentThread
GetCurrentThreadId
lstrcmpA
lstrcmpiA
GetUserDefaultLangID
DeleteFileW
CopyFileA
GetProcessHeap
MulDiv
GetWindowsDirectoryA
IsDebuggerPresent
GlobalFindAtomW
GetCurrentProcess
GetCommandLineA
RemoveDirectoryA
GetThreadLocale
lstrlenW
QueryPerformanceCounter
GetDriveTypeA
DeleteFileA
lstrcmpiW
GetTickCount
GetCommandLineW
GetModuleHandleW
SetCurrentDirectoryA
lstrlenA
GlobalFindAtomA
GetConsoleOutputCP
GetModuleHandleA
VirtualAlloc
VirtualFree
glu32
gluNurbsCallback
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Sdpxfr P Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Ggglxvtk Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ