Static task
static1
Behavioral task
behavioral1
Sample
2dc4af63c3ee9cbf51e081f48d416d30_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2dc4af63c3ee9cbf51e081f48d416d30_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2dc4af63c3ee9cbf51e081f48d416d30_JaffaCakes118
-
Size
194KB
-
MD5
2dc4af63c3ee9cbf51e081f48d416d30
-
SHA1
5aa8ca1f3c85af3bdce36b4931b9da53e6f75045
-
SHA256
289343b2c6f01c9fd3ab2ab4a76df8ef23be2456399a925c70d7c2a3a85ae539
-
SHA512
081d414014e745fcec9eed26c3cfb7644206dcd704b42a4904af4d58e43d91840152df5fc366e5b17caaad58b6b0288f4e1114cbe2ec59fb1abe27ae7ab5b152
-
SSDEEP
3072:/t8pf3SxPjYV38rhT+KodUo0pJ76O1mjCBLgKtN+8sayUtunGv1aLZKk2xoevQq9:1qndgYdUo7CBLF+8dkSaLZKk86JBr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2dc4af63c3ee9cbf51e081f48d416d30_JaffaCakes118
Files
-
2dc4af63c3ee9cbf51e081f48d416d30_JaffaCakes118.exe windows:5 windows x86 arch:x86
db720d2bfb09c7cd759f639953bfb6c9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
WindowFromDC
SetProcessWindowStation
SetActiveWindow
ReleaseDC
MonitorFromPoint
IsIconic
GetWindowInfo
GetMonitorInfoA
GetForegroundWindow
GetDC
EnumDisplayDevicesA
gdi32
CreateDCA
SetDIBitsToDevice
GetDCOrgEx
ExtEscape
DeleteDC
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
kernel32
TlsSetValue
VirtualQuery
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
TlsFree
WaitForSingleObject
WideCharToMultiByte
WriteFile
TlsGetValue
GetSystemInfo
CloseHandle
CompareStringA
CompareStringW
CreateFileA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetEnvironmentStringsA
GetEnvironmentStringsW
GetFileType
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemTimeAsFileTime
GetTickCount
GetVersion
GetVersionExA
HeapAlloc
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadCodePtr
IsBadReadPtr
IsBadWritePtr
LCMapStringA
LCMapStringW
LoadLibraryA
MultiByteToWideChar
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadFile
ReleaseMutex
RtlUnwind
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
SetSystemTimeAdjustment
SetThreadAffinityMask
SetUnhandledExceptionFilter
Sleep
SwitchToThread
TerminateProcess
TlsAlloc
Sections
.text Size: 146KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ