Static task
static1
Behavioral task
behavioral1
Sample
2e98baf80100373a2d34e3a540537d3b_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2e98baf80100373a2d34e3a540537d3b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2e98baf80100373a2d34e3a540537d3b_JaffaCakes118
-
Size
4.9MB
-
MD5
2e98baf80100373a2d34e3a540537d3b
-
SHA1
079552fa1630ed985d5ae1b30e0ab1a180b90b7c
-
SHA256
4b96b5fc845c5d6277c1ceb1cf3a9a900e2459f6e852bb4114246baaf9664c40
-
SHA512
43bed36c56fa6b27f451b01cbf74ca7c9323981c87995b0a38a5a1f8243c0d5351ba869a247659d4c8661fc5af2bbd0657b81bf2bd53f3e2142ec944884960d5
-
SSDEEP
24576:fDhNDYBI1V2Bkn+xL2dLzrS/lwbWxDlKK31kYes1ivsWvZnq8BNSdjv+NGsThKIo:UOH25W2l3/K21hFsRnq82JvlL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e98baf80100373a2d34e3a540537d3b_JaffaCakes118
Files
-
2e98baf80100373a2d34e3a540537d3b_JaffaCakes118.exe windows:5 windows x86 arch:x86
826c1654e3f341a152baea7cb115fac9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAllocEx
GetLastError
CloseHandle
GetTempPathW
GetThreadLocale
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetCommandLineA
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetTickCount
GetModuleHandleW
GetProcAddress
CreateSemaphoreW
CreateThread
ExitThread
LoadLibraryExW
HeapFree
CreateTimerQueue
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
HeapAlloc
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
GetModuleFileNameA
WriteFile
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
IsDebuggerPresent
OutputDebugStringW
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleHandleA
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
ReleaseSemaphore
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
HeapReAlloc
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
LoadLibraryW
GetStringTypeW
SetStdHandle
WriteConsoleW
CreateFileW
secur32
DeleteSecurityContext
QuerySecurityPackageInfoW
FreeCredentialsHandle
Sections
.text Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4.7MB - Virtual size: 10.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ