Static task
static1
Behavioral task
behavioral1
Sample
2d968f4de5975c82d99a375a15161587_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
2d968f4de5975c82d99a375a15161587_JaffaCakes118
-
Size
318KB
-
MD5
2d968f4de5975c82d99a375a15161587
-
SHA1
ffe358f0755197a6ad671b8817e4dd7256543938
-
SHA256
f43cf71a70df2b26145d275a38dae1abb9f93722499acee0d7e52b5d6f4d218d
-
SHA512
6a6fa621c71f300064baa1168aaa3c7cec986d2f6eac6016fe59903513e3591258207e1702ae9b194196ad31451edf0aed661deae08dcd50cf287c732bec315b
-
SSDEEP
6144:igSM/As+b29u92cN/TNLubqPbkrGnUkUsMleHW/8kPLw7ZRq:bbF+q9GZT1YqPYKnUkU2W/80cZk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d968f4de5975c82d99a375a15161587_JaffaCakes118
Files
-
2d968f4de5975c82d99a375a15161587_JaffaCakes118.exe windows:4 windows x86 arch:x86
a41cfb9fb794e01a6f8c2dea60ea2656
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CreateWindowExA
kernel32
GetStringTypeW
GetProcAddress
GetModuleHandleA
CloseHandle
GetModuleFileNameA
LockResource
LoadResource
SizeofResource
FindResourceA
CreateMutexA
OpenMutexA
HeapFree
HeapReAlloc
HeapAlloc
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 299KB - Virtual size: 298KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ