Static task
static1
Behavioral task
behavioral1
Sample
2fa658cf2e7d5633a585dcb1c9bcd46b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2fa658cf2e7d5633a585dcb1c9bcd46b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2fa658cf2e7d5633a585dcb1c9bcd46b_JaffaCakes118
-
Size
37KB
-
MD5
2fa658cf2e7d5633a585dcb1c9bcd46b
-
SHA1
21ab1c5dd3d4f5fa674397d7f771e31699550d69
-
SHA256
68d87fd4940c7eecb5b042faa43a67089378a081bbbdac123b4b9ba83740f542
-
SHA512
9cf4a3b4902158ae834a5a789f8e894cb1c631ea466e3107d5f251c4f3a57336820fc540bbb04d478389f4e04509c11628d4a7b38e69ca523bf5118e7930ce2b
-
SSDEEP
384:D98wWOyO0/OdSRST5PCLKDrWczhSk78CoNcFOIF:fWOyWdyqUEEQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2fa658cf2e7d5633a585dcb1c9bcd46b_JaffaCakes118
Files
-
2fa658cf2e7d5633a585dcb1c9bcd46b_JaffaCakes118.exe windows:4 windows x86 arch:x86
46084168b412e051097ae39c055c9320
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetModuleHandleW
Sleep
GetLastError
MoveFileW
GetSystemTimeAsFileTime
DeleteFileW
lstrcpyW
lstrlenW
GetEnvironmentVariableW
lstrcmpA
lstrlenA
UnmapViewOfFile
VirtualAlloc
VirtualFree
GetModuleHandleA
VirtualProtect
SetLastError
LoadLibraryA
LoadLibraryExA
lstrcatA
lstrcpyA
GetModuleFileNameA
GetProcAddress
HeapFree
FreeLibrary
HeapAlloc
GetProcessHeap
LoadLibraryW
LoadLibraryExW
lstrcatW
ReadFile
SetFilePointer
MapViewOfFileEx
CloseHandle
MapViewOfFile
CreateFileMappingW
ExitProcess
FormatMessageA
SetEnvironmentVariableW
GetFileSize
CreateFileW
WideCharToMultiByte
lstrcpynW
user32
MessageBoxA
wsprintfW
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.res Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ