Static task
static1
Behavioral task
behavioral1
Sample
2d537630b917a101b29de0a3e3bd85ce_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2d537630b917a101b29de0a3e3bd85ce_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2d537630b917a101b29de0a3e3bd85ce_JaffaCakes118
-
Size
898KB
-
MD5
2d537630b917a101b29de0a3e3bd85ce
-
SHA1
3f26921723bf7ea79ef31767369ffc0cfc8d14c6
-
SHA256
1e4c4f79a97dc06a4fa73854d292ac011b4ac05d9409a2fa7d9367eb538085c4
-
SHA512
76326b5588ce266a051d2b2c10aee14439c08d1f0e7ba3e7af6c197cc50308a1854090f699ffacfe2d352b1910c3eb0d8fb48fffd3729c5986ef90e90d58fc54
-
SSDEEP
24576:YQgXRpPgs6PLGuIugL0w48JWXuwEr+U1oDsJm:DiThL4PErL14s0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d537630b917a101b29de0a3e3bd85ce_JaffaCakes118
Files
-
2d537630b917a101b29de0a3e3bd85ce_JaffaCakes118.exe windows:4 windows x86 arch:x86
4ce1c6b15b4bf3c36eff6a8d78042140
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
SetThreadPriority
FindFirstFileW
TerminateProcess
FormatMessageW
lstrcmpiA
GetModuleHandleA
GetProcessHeap
FindResourceW
GetStringTypeA
GlobalUnlock
VirtualFree
GetCPInfo
GetUserDefaultUILanguage
GetModuleHandleW
lstrcpyA
LoadLibraryA
CompareStringA
GetTickCount
GetProcAddress
FindResourceA
FindNextFileW
GlobalMemoryStatus
GetTimeFormatA
FreeLibrary
GetFileSize
OutputDebugStringA
GlobalFree
VirtualAlloc
VirtualProtect
GetLocalTime
InterlockedDecrement
GetSystemTimeAsFileTime
ExitProcess
ExpandEnvironmentStringsW
GlobalLock
GetFileSizeEx
WriteConsoleW
GetTempFileNameA
GetCommandLineA
GetModuleFileNameA
MulDiv
HeapAlloc
SystemTimeToFileTime
GetFileAttributesA
GetVersionExA
GetEnvironmentVariableW
LoadResource
InterlockedExchange
SetLastError
GetOEMCP
advapi32
RegDeleteValueA
RegQueryValueExA
RegCreateKeyExA
CryptReleaseContext
CryptCreateHash
RegEnumValueW
RegCreateKeyW
DuplicateTokenEx
CryptHashData
RegCloseKey
CryptGetHashParam
AdjustTokenPrivileges
RegEnumKeyExA
CryptAcquireContextW
OpenThreadToken
RegSetValueExA
msvcrt
_initterm
__set_app_type
memcpy
realloc
__setusermatherr
memset
user32
GetSysColor
GetForegroundWindow
GetKeyState
TranslateMessage
DefWindowProcA
GetWindowTextA
CloseWindowStation
GetWindowLongA
OpenDesktopA
LoadStringW
DrawEdge
SetWindowsHookExW
SetWindowLongA
GetMenuItemID
SetThreadDesktop
OpenWindowStationA
GetClassNameA
ToUnicode
MsgWaitForMultipleObjects
SendMessageA
CallNextHookEx
LoadCursorA
SetDlgItemTextA
EnableMenuItem
shlwapi
PathMatchSpecW
StrCmpNIA
wnsprintfA
PathRemoveFileSpecW
PathFindFileNameW
SHDeleteKeyA
PathCombineW
wnsprintfW
PathFileExistsW
aclui
CreateSecurityPage
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ