Static task
static1
Behavioral task
behavioral1
Sample
2ae34125593ac257c855812f6657101d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ae34125593ac257c855812f6657101d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2ae34125593ac257c855812f6657101d_JaffaCakes118
-
Size
172KB
-
MD5
2ae34125593ac257c855812f6657101d
-
SHA1
e19de68c860b47df22c4d0977ef4112600affb8d
-
SHA256
1ec97a6381c17e9db78b767b7f78bf063ab567fe8b0f6aa4a85c5729e86a72d0
-
SHA512
4857d673023a5d374537dfa2d37479aeac62358f825bb856bbac307ccfeeacab06d9565f06df09d6f5137ba99dbc818d230407172407e9fbad2c1c03a4c2ba45
-
SSDEEP
3072:D0aDriu7OvApH7ENFn33Wm9gj5CgmJ6ndtedzRefnW3jsXa3ch:D0aD1DR7W3Wm9E5CgmSKs+3jsX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ae34125593ac257c855812f6657101d_JaffaCakes118
Files
-
2ae34125593ac257c855812f6657101d_JaffaCakes118.exe windows:4 windows x86 arch:x86
204803378cff042f706299d56a89044e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_Write
ImageList_Read
ole32
CreateBindCtx
MkParseDisplayName
shell32
SHGetFileInfoA
SHGetFolderPathA
user32
GetSubMenu
GetWindow
EnumChildWindows
GetMessagePos
GetSysColor
GetCapture
IsChild
BeginPaint
GetCursor
GetClipboardData
DeferWindowPos
GetActiveWindow
IsWindowEnabled
EqualRect
GetPropA
GetScrollRange
GetMenuStringA
CharToOemA
GetMenuState
ShowScrollBar
GetSysColorBrush
GetScrollInfo
GetMenuItemID
GetDesktopWindow
DrawMenuBar
GetWindowTextA
GetClassLongA
GetMenuItemInfoA
GetKeyNameTextA
GetScrollPos
GetDlgItem
CreateWindowExA
GetParent
shlwapi
SHDeleteValueA
PathIsDirectoryA
SHGetValueA
SHStrDupA
SHSetValueA
SHEnumValueA
SHQueryValueExA
PathGetCharTypeA
PathIsContentTypeA
comdlg32
GetSaveFileNameA
kernel32
VirtualQuery
lstrcpynA
FreeLibrary
GlobalDeleteAtom
Sleep
lstrcpyA
InitializeCriticalSection
GetStdHandle
MulDiv
SizeofResource
LockResource
FindResourceA
DeleteFileA
FormatMessageA
GetSystemDefaultLangID
lstrcmpiA
SetEndOfFile
GetDiskFreeSpaceA
ResetEvent
GetFileType
LoadResource
HeapAlloc
CreateFileA
GetACP
SetHandleCount
GetModuleFileNameA
GetCommandLineA
MoveFileExA
GlobalFindAtomA
GlobalAddAtomA
VirtualAlloc
GetLocalTime
VirtualFree
SetLastError
SetFilePointer
lstrcmpA
GetCPInfo
EnumCalendarInfoA
GetCurrentThreadId
lstrcatA
LocalReAlloc
ReadFile
EnterCriticalSection
HeapDestroy
SetEvent
GetEnvironmentStrings
FindClose
HeapFree
WaitForSingleObject
GetTickCount
VirtualAllocEx
LocalAlloc
CreateThread
GetCurrentProcessId
GetModuleHandleA
CompareStringA
GetStartupInfoA
ExitProcess
GetFileAttributesA
SetErrorMode
LoadLibraryExA
GetVersionExA
GetLastError
msvcrt
strcmp
calloc
atan
memmove
memcpy
Sections
CODE Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 119KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 603B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ