Static task
static1
Behavioral task
behavioral1
Sample
2f307c71018926e9c7c7f07cc882d039_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f307c71018926e9c7c7f07cc882d039_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2f307c71018926e9c7c7f07cc882d039_JaffaCakes118
-
Size
82KB
-
MD5
2f307c71018926e9c7c7f07cc882d039
-
SHA1
7e56020e6b92177eac2c994c7e814ec7a90f9145
-
SHA256
bd45411e6702bdeac0cea6036940e55985a5c8f52a34383fe8836a6e4fb414e5
-
SHA512
55ad383131993c92fb1cdcede48a32697899039f0ab47e6f38caf360cf6f0f19b10741ea055fa5ea9777163dd7d9d0e525b52f7aff7fdba6d2e6c6e99dd52744
-
SSDEEP
1536:d0DDje0hMm0lmazqS28TSxyqCiHJfaR17w6E1Q4D+0+JEgHsrQYXjZtSWSoqX+:d0i0hMm0lm2qHGmf017wv1Q4SPHsrQY9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f307c71018926e9c7c7f07cc882d039_JaffaCakes118
Files
-
2f307c71018926e9c7c7f07cc882d039_JaffaCakes118.exe windows:4 windows x86 arch:x86
898912e925af7d34af7dc460526c7fcc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_initterm
_controlfp
__p__fmode
_XcptFilter
__p___initenv
__p__commode
free
__set_app_type
__getmainargs
_exit
_except_handler3
calloc
_adjust_fdiv
__setusermatherr
kernel32
MoveFileA
GetProcessHeap
VirtualQuery
VirtualAlloc
WritePrivateProfileStringA
VirtualProtectEx
FlushFileBuffers
GetProcAddress
GetTimeZoneInformation
GetModuleHandleW
lstrcmpA
FreeEnvironmentStringsW
RtlUnwind
GetVersionExA
lstrcatA
GetEnvironmentStringsW
CopyFileA
GetModuleFileNameW
DeleteFileA
GetOEMCP
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE