Static task
static1
Behavioral task
behavioral1
Sample
2cf9ec3c3a58cb0096e19da58c30fab9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2cf9ec3c3a58cb0096e19da58c30fab9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2cf9ec3c3a58cb0096e19da58c30fab9_JaffaCakes118
-
Size
255KB
-
MD5
2cf9ec3c3a58cb0096e19da58c30fab9
-
SHA1
30c9bc774d23d8611a5a2843cfcb2bfe718f96af
-
SHA256
0bcbe582632d38302c46bc5fb2aab9caeb676bf10e5fa1429baf21b283c49c2c
-
SHA512
3cd08251c30cc7d121e36d29e0902a3b41f49c2cfa02fc843233f007ec8d1d034dccd807c38480ab61cdbd4a2b3652abb83bf1a487bb87232681b00ee44621bd
-
SSDEEP
6144:nHBfX+oCSUhfwvscIqwF/OtVf9IxWlAr7TWgQkpUyV:H1uoQfwGqwAtVTl8agBUY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2cf9ec3c3a58cb0096e19da58c30fab9_JaffaCakes118
Files
-
2cf9ec3c3a58cb0096e19da58c30fab9_JaffaCakes118.exe windows:4 windows x86 arch:x86
5f20a215fdcb0cc094aaf5309ceb7f3d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetLastError
GetTickCount
GetCurrentProcess
MultiByteToWideChar
GetSystemDirectoryW
GetVersionExA
GetProcessHeap
GetStartupInfoW
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsAlloc
GetCurrentThreadId
HeapCreate
ExitProcess
GetModuleFileNameA
GetEnvironmentStringsW
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
Sleep
GetLocaleInfoA
InitializeCriticalSection
LoadLibraryA
GetModuleHandleW
GetProcAddress
user32
GetSystemMetrics
RemoveMenu
IsChild
MonitorFromRect
InsertMenuA
GetForegroundWindow
CharLowerA
DialogBoxIndirectParamA
GetScrollPos
RegisterClassExW
RegisterWindowMessageW
MoveWindow
DefWindowProcA
RegisterClassExA
GetActiveWindow
SetDlgItemTextA
DialogBoxIndirectParamW
MessageBoxA
SetCapture
LoadMenuA
CreatePopupMenu
DialogBoxParamA
CreateDialogIndirectParamA
SetParent
CharNextW
EnableMenuItem
GetClassInfoA
wvsprintfW
CheckMenuItem
CharUpperW
InvalidateRgn
IsIconic
TrackPopupMenuEx
PeekMessageW
GetDCEx
EnableWindow
EmptyClipboard
GetSysColor
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
CloseServiceHandle
StartServiceW
OpenServiceW
OpenSCManagerW
resutils
ResUtilGetProperty
ResUtilVerifyPrivatePropertyList
ResUtilStartResourceService
ResUtilSetSzValue
ResUtilFreeParameterBlock
ClusWorkerCheckTerminate
ResUtilSetBinaryValue
ResUtilFindBinaryProperty
ResUtilSetResourceServiceEnvironment
ResUtilVerifyService
ResUtilSetExpandSzValue
gdi32
GetTextExtentPointA
GetEnhMetaFileW
CreateFontIndirectW
CreateScalableFontResourceW
CreateBitmapIndirect
GetEnhMetaFileA
CreateFontW
kbdbene
KbdLayerDescriptor
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 1024B - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 106KB - Virtual size: 190KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 3KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 391KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 111KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ