Static task
static1
Behavioral task
behavioral1
Sample
2d1e11d9cc131a04d410f78bc8eb0bc6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2d1e11d9cc131a04d410f78bc8eb0bc6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2d1e11d9cc131a04d410f78bc8eb0bc6_JaffaCakes118
-
Size
98KB
-
MD5
2d1e11d9cc131a04d410f78bc8eb0bc6
-
SHA1
02485df9e0dcd0a4a41b2ec327d27784fbc06502
-
SHA256
a7171feaf9b10e6f5ca1f10046dbdc642c79b7844bb58152c73fb3a7fa931518
-
SHA512
ee91eff33a0feeeed51ef678b1552b19af74831516f8c3cce3881975cc3ad92ae860d4a80ea47c9ae7cfdf53ac90b53f87c19c7093045fca5ad8a3981b9f142f
-
SSDEEP
1536:U4mrWUHrzMsZ0nypsHGmM4SN0v6DcLXJQUB1z6bbQt+2i2u+DFnytp:UrfrzMs2y4GuwATH5ta/4nk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d1e11d9cc131a04d410f78bc8eb0bc6_JaffaCakes118
Files
-
2d1e11d9cc131a04d410f78bc8eb0bc6_JaffaCakes118.exe windows:4 windows x86 arch:x86
f1e1e43e7697f50362aee441e478bce0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerInstallFileA
GetFileVersionInfoA
user32
MoveWindow
SetWindowLongW
EndPaint
EmptyClipboard
DestroyMenu
DrawTextA
IsZoomed
GetMenuStringA
WindowFromPoint
GetClassLongA
InsertMenuA
GetCursor
CharLowerBuffA
SystemParametersInfoA
GetWindow
RegisterClassA
GetCapture
UpdateWindow
EnumChildWindows
CreateIcon
GetMenuState
InvalidateRect
ShowWindow
CloseClipboard
GetClassNameA
OemToCharA
RegisterClipboardFormatA
LoadKeyboardLayoutA
GetWindowRect
OffsetRect
SendMessageA
GetActiveWindow
oleaut32
SafeArrayGetElement
SafeArrayGetUBound
OleLoadPicture
SysStringLen
RegisterTypeLib
GetErrorInfo
SysReAllocStringLen
SafeArrayPtrOfIndex
SysFreeString
SafeArrayUnaccessData
msvcrt
calloc
strcmp
pow
fabs
memcpy
cos
comdlg32
ChooseColorA
FindTextA
GetSaveFileNameA
GetFileTitleA
shell32
SHGetDiskFreeSpaceA
Shell_NotifyIconA
SHGetDesktopFolder
advapi32
RegCreateKeyExA
shlwapi
SHGetValueA
PathIsContentTypeA
PathGetCharTypeA
SHStrDupA
SHDeleteValueA
kernel32
LoadLibraryExA
GetVersion
GetCurrentProcess
FormatMessageA
GetCurrentThreadId
GetProcAddress
GetStringTypeA
GetSystemDefaultLangID
ReadFile
GetCurrentProcessId
FindResourceA
LocalReAlloc
GetEnvironmentStrings
VirtualAllocEx
WideCharToMultiByte
SetEndOfFile
GetCurrentThread
FreeResource
GetFullPathNameA
GetCommandLineA
SizeofResource
SetErrorMode
ExitThread
FindClose
GetUserDefaultLCID
FindFirstFileA
VirtualAlloc
GetACP
CreateFileA
Sleep
lstrcmpiA
GetLocalTime
GetStartupInfoA
CompareStringA
HeapFree
GetThreadLocale
SetThreadLocale
GetProcessHeap
HeapAlloc
SetHandleCount
LoadLibraryA
CloseHandle
SetEvent
lstrcpynA
DeleteCriticalSection
GetModuleHandleA
VirtualFree
EnterCriticalSection
Sections
CODE Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ