Static task
static1
Behavioral task
behavioral1
Sample
2c62a52ee12276fad8dd78e20bd12704_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2c62a52ee12276fad8dd78e20bd12704_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2c62a52ee12276fad8dd78e20bd12704_JaffaCakes118
-
Size
60KB
-
MD5
2c62a52ee12276fad8dd78e20bd12704
-
SHA1
68b05f546837f919b2500dc67a4066b54e1527e4
-
SHA256
bc2fefbc739eec8a3b0dcdaace14e622dfea512104aa729d39f3d44ff33753e9
-
SHA512
3778e30f48b1b69a08a559a37544b07142408adba21527266c39a2b8c8685f7567ae24c30e675f65de60996958cf15f50ba162d903ec431dfe0af0b8027883e3
-
SSDEEP
768:3iVzbWdVdQ2W0pphGMF9teZd0qJqZyuD7/wiqkqbpM0d/eTebE6IsylL:SVcVu00sfm0qqZd7/ek0GfT8ERlL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c62a52ee12276fad8dd78e20bd12704_JaffaCakes118
Files
-
2c62a52ee12276fad8dd78e20bd12704_JaffaCakes118.exe windows:4 windows x86 arch:x86
450eef00b9547682314ef48bcf43f4bd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
AllocateAndInitializeSid
CreateServiceA
FreeSid
GetTokenInformation
InitializeSecurityDescriptor
RegEnumKeyExA
RegEnumValueA
StartServiceCtrlDispatcherA
kernel32
CloseHandle
CreateDirectoryA
CreateEventA
CreateFileA
CreateMutexA
CreateThread
DeleteCriticalSection
EnterCriticalSection
EnumSystemLocalesA
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeA
GetFileType
GetLastError
GetLocaleInfoA
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetSystemInfo
GetSystemTime
GetThreadLocale
GetTickCount
GetUserDefaultLCID
GetVersionExA
GlobalAlloc
GlobalFree
GlobalUnlock
HeapFree
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedIncrement
IsBadCodePtr
IsDebuggerPresent
IsValidCodePage
LCMapStringA
LeaveCriticalSection
LoadLibraryA
MapViewOfFile
Module32Next
MoveFileA
MulDiv
MultiByteToWideChar
OutputDebugStringA
QueryPerformanceCounter
RaiseException
ReadProcessMemory
RemoveDirectoryA
RtlUnwind
SetEnvironmentVariableA
SetLastError
SetThreadPriority
Sleep
SystemTimeToFileTime
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
lstrcpyA
user32
BeginPaint
CallNextHookEx
CharPrevA
ClientToScreen
CreateDialogParamA
DispatchMessageA
EnumChildWindows
GetDesktopWindow
GetDlgItemTextA
GetForegroundWindow
GetMessageA
GetParent
GetSubMenu
GetSysColorBrush
GetSystemMetrics
GetWindowLongA
GetWindowThreadProcessId
InvalidateRect
MessageBoxA
PostMessageA
RegisterClassExA
ReleaseCapture
SendMessageA
SetCapture
SetForegroundWindow
SetMenu
ShowWindow
UnregisterClassA
UpdateWindow
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 24KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.DATA Size: 14KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ